Secure Information Sharing in Cloud Exploitation Revocable Storage Identity Primarily Based Encryption
Ponnuru Anusha1, Ganga Ramakoteswararao2
1Ponnuru Anusha, M.Tech Scholar, Department of Information Technology, Velagapudi Ramakrishna Siddhartha Engineering College, Kanuru (Andhra Pradesh), India.
2Ganga Ramakoteswararao, Professor, Department of Information Technology, Velagapudi Ramakrishna Siddhartha Engineering College, Kanuru (Andhra Pradesh), India.
Manuscript received on 26 March 2019 | Revised Manuscript received on 07 April 2019 | Manuscript Published on 18 April 2019 | PP: 805-809 | Volume-7 Issue-6S March 2019 | Retrieval Number: F03570376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing is one in each of the ways in which to store data and data sharing firmly. However, is directly outsourcing the data into the cloud, from the third parties we’ve got an inclination to possess gotten many security problems. If users having any valuable and sensitive knowledge it is a massive downside. To offer security for the data inside the cloud we’ve a fixed to unit of measurement having many techniques and algorithms. One in every of the on top of algorithms, the annulment of coding supported knowledge supported storage, is employed to beat the shortcomings. It offers methods of reverse and reverses secrecy. Knowledge of the information that the information provider updates with its data (i.e. Ciphertext Update), at a similar time all previous user’s secret key’s expired. They have to renew their secret keys otherwise they’re revoked (i.e. Revocation).Here, in general, it focuses on revoking the user and updating the encrypted text.
Keywords: Identity Based Encryption, Key Management, Cloud Computing, Ciphertext Update and Revocation.
Scope of the Article: Cloud Computing