Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Two Layer Encryption be Imminent to Protected Data Sharing in Cloud Computing

V.VIDYA, K.PADMA KIRAN, C.VANI , K.TARAKESWAR,
Affiliations
Department of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
Cloud computing is a emerging paradigm of computing in IT because of its performance ,low cost ,availability accessibility ,economy of scale, on-demand and other luxuries. Data is the most valuable of clients (or) company’s asset; it must be protected with much vigilance than any other. Data Security in cloud is one of the big issue which acts as obstacle in the implementation of cloud computing. In this paper we proposed scheme is „Two Layer Encryption‟ means Double Encryption for securely outsourcing the data in cloud. This scheme solves key escrow problem and Data Reveal problem by RSA algorithm of asymmetric key approach. In existing mCL-PKE scheme there is Certificate-less Encryption and also single encryption. In our proposed scheme we have two layer encryption schemes by this approach the data/information will be highly secured while preserving and sharing in cloud environment.


Citation
V.VIDYA,K.PADMA KIRAN,C.VANI,K.TARAKESWAR."Two Layer Encryption be Imminent to Protected Data Sharing in Cloud Computing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 05,pp.266-270, NOVEMBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I51.pdf,


Keywords : Cloud computing, Data security, Decryption center, RSA algorithm, cloud computing, Asymmetric key, Two Layer Encryption.

References
[1]. Mohamed Nabeel, Elisa Bertino, Seung-Hyun Seo,
Xiaoyu‖ Ding‖ Members‖ of‖ IEEE‖ ‚An‖ Efficient‖
Certificate-less Encryption for Secure Data Sharing in
Public‖Clouds‛‖June‖2013.‖
[2]. Zhiguo Wan, Jun‟ e Liu and Robert H. Deng.
Senior‖ Member,‖ IEEE‖ ‚HASBE:‖ A‖ Hierarchical‖
Attribute-Based Solution for Flexible and Scalable
Access‖Control‖in‖Cloud‖Computing‛‖April‖2012.‖
[3]. Mohamed Nabeel, Student Member, IEEE, Ning
Shang, Elisa Bertino‖Fellow,‖ IEEE‖‚Privacy‖Preserving‖
Policy‖Based‖Content‖Sharing‖in‖Public‖Clouds‛‖2013.‖
[4]. Mohamed Nabeel, Elisa Bertino Fellow, IEEE
‚Privacy‖ Preserving‖ Delegated‖ Access‖ Control‖ in‖
Public‖Clouds‛‖2013.‖
[5]. Yang Tang, Patrick P.C. Lee, Member, IEEE, John
C.S. Lui, Fellow, IEEE, and Radia Perlman, Fellow,
IEEE‖ ‚Secure‖ Overlay‖ Cloud‖ Storage‖ With‖ Access‖
Control‖ and‖ Assured‖ Deletion‛‖ November/December‖
2012.
[6]. Sushmita Ruj, CSE, Indian Institute of Technology,
Indore, India, Milos Stojmenovic, Singidunum
University, Belgrade, Serbia, Amiya Nayak, SEECS,
University‖ of‖ Ottawa,‖ Canada,‖ ‚Decentralized‖ Access‖
Control with Anonymous Authentication of Data
Stored‖in‖Clouds‛‖2013.‖
[7]. Smitha Sundareswaran, Anna C. Squicciarini,
Member,‖ IEEE,‖ and‖ Dan‖ Lin,‖ ‚Ensuring Distributed
Accountability‖ for‖ Data‖ Sharing‖in‖ the‖ Cloud‛‖March‖
2012.
[8]. Junzuo Lai, Robert H. Deng, Chaowen Guan, and
Jian‖ Weng‖ ‚Attribute- Based Encryption with
Verifiable‖Outsourced‖Decryption‛‖2013.
[9] Veerraju Gampala, Srilakshmi Inuganti, Satish
Muppidi‖ ―Data‖ Security‖ in‖ Cloud‖ Computing‖ with‖
Elliptic‖Curve‖Cryptography‖‖ International‖ Journal‖of‖
Soft Computing and Engineering (IJSCE) ISSN: 2231-
2307, Volume-2, Issue-3, July 2012. [11] N. Koblitz.
Elliptic curve cryptosystems. Mathematics of
Computation, 48:203–209,1987.
[10] V. Miller. Use of elliptic curves in cryptography.
Advances in Cryptology—CRYPTO‖ ‘85‖ (LNCS‖ 218)‖
[483], 417– 426, 1986.


DOI Link : NOT ASSIGNED

Download :
  V1I51.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]