ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Advanced Implementation for Cryptography and Encryption in Cloud Computing Using Identity Based Encryption Techniques

Journal: International Journal of Science and Research (IJSR) (Vol.8, No. 8)

Publication Date:

Authors : ;

Page : 1357-1360

Keywords : Encryption; Cryptography; Cloud Computing Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing provides clients with a virtual computing infrastructure on top of which they can store data and run applications. While the benefits of cloud computing are clear, it introduces new security challenges since cloud operators are expected to manipulate client data without necessarily being fully trusted. We are designing cryptographic primitives and protocols tailored to the setting of cloud computing, attempting to strike a balance between security, efficiency and functionality. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. To keep sensitive user data confidential against un trusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. This paper explores various data encryption techniques such as homophormic encryption, searchable and structured encryption, Identity based encryption, signature based encryption etc.

Last modified: 2021-06-28 18:22:28