Institute of Research and Journals (IRAJ)
The key approach to secure the data stored in cloud computing environment is to store the data in encrypted manner. Whenever an authorized user wishes to store data on the cloud, the data is first encrypted and then the decryption key is distributed to other authorized users. The other authorized users can decrypt the data with the decryption key. But to prevent the revoked authorized users from accessing the data, the owner of the data will command to re-encrypt the data and distribute new decryption key to the other authorized users.