Verifiable Cryptographic Based Data Transformation System

In this paper, the authors propose a strategy for checking the uniqueness of attribute based encryption using proxies and outsourced decryption. An Issues related to the information sharing in a distributed system is one of the major practical issue consisting of autonomous entities which needs to be securely transferred in a heterogeneous multi subdivided systems. Hence, the concepts of encryption and decryption are formulated to transfer the data from source to destination securely. By using an encryption/decryption standard their distributed secure computation systems show that their approach seamlessly integrates security enforcement at the user intensity with a certain trust level.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Advanced Research in Computer Engineering & Technology
Topic:
Security
Format:
PDF