News & Updation
A SECURE DELEGATION PROCESS USING CIRCUIT CIPHERA SECURE DELEGATION PROCESS USING CIRCUIT CIPHERA SECURE DELEGATION PROCESS USING CIRCUIT CIPHERA SECURE DELEGATION PROCESS USING CIRCUIT CIPHERA SECURE DELEGATION PROCESS USING CIRCUIT CIPHERA SECURE DELEGA
Divya K.S, Ranjitha V.,* Mehak Showkat and Likhitha V.N.
Cloud Computing is a new technology that is widely being used and was introduced in the original ARPANET by 1977. The word cloud Computing does not have any clear well defined meaning. Though cloud computing has uncountable advantages, it still lacks behind in the areas concerning security and privacy. For such purposes, we make use of certain technologies which help overcome these shortcomings. Technologies such as Encryption and cipher-text circuit policy are being implemented for privacy and security. Cloud computing ensures that there is increasing trust dependency on remote servers and the services they provide. Data owner encrypt their data before sending it to the cloud for privacy. Delegation is a process which is used by the end-users who have less computing power. The decryption process is delegated by the data owner to the cloud to reduce the computation cost. Sometimes the cloud server may tamper the given cipher text and send the modified one to the data user for attack. The access control is implemented effectively using a circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation method. Also there is proper use of the k-multi linear Decisional Diffie-Hellman algorithm to improve the security of encrypted data.[Full Text Article]