Key Aggregate Policies for Secure Data Sharing in Cloud Storage

Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Data Management
Format: PDF
Sensitive information modified should be firmly done to verify the integrity of cloud information, to stop it from being disclosed to or modified by unauthorized parties. Many enterprises supply information storage to the cloud mere a member of a company or information owner can merely share information with completely different members or users with confidentiality. The new public key aggregate policies that prove constant-size cipher text wherever mere cipher text unit labeled with sets of attributes and private keys unit associated with structures that management that user is able to decrypt.

Find By Topic