2016
DOI: 10.17485/ijst/2016/v9i11/88453
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Integrity Policy for Encrypted Data in Secure Storage using Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…In Key aggregate cryptosystem, several number of private keys are combined to produce one key which has powers of all keys combined which is used in decryption access rights of cipher text set and persisting encrypted files outside the set were remains classified. S. Kumari and A.R.N Kamal (9) have suggested an approach which Attribute Based Cryptography and bilinear mapping (BM-ABE) are used so that security of data and integrity is maintained in cloud so that data shared is secure. The key which is secret is made more secure using MAC verification.…”
Section: Ecs Transactions 107 (1) 4905-4912 (2022)mentioning
confidence: 99%
“…In Key aggregate cryptosystem, several number of private keys are combined to produce one key which has powers of all keys combined which is used in decryption access rights of cipher text set and persisting encrypted files outside the set were remains classified. S. Kumari and A.R.N Kamal (9) have suggested an approach which Attribute Based Cryptography and bilinear mapping (BM-ABE) are used so that security of data and integrity is maintained in cloud so that data shared is secure. The key which is secret is made more secure using MAC verification.…”
Section: Ecs Transactions 107 (1) 4905-4912 (2022)mentioning
confidence: 99%
“…Existing PHRs (1) used attributed based encryption method (2) for storing in the cloud with various improvements in storing, searching, accessing of health records (5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16). Many encryption algorithms (18) and steganography algorithms (17) related to health care were studied along with its applications in adaptive learning (20)(21) and energy efficient in wireless networks (19).…”
Section: Assured Sharing Of Information In Cloudmentioning
confidence: 99%
“…Providing security to cloud storage is an important essential task. There are different types of encryption techniques that are developed for encrypting the data before outsourcing it to the cloud. The main intention of the encryption techniques is to provide high security, access control, and data confidentiality to the cloud data.…”
Section: Introductionmentioning
confidence: 99%