Loading

Secured Data Outsourcing in Cloud with ECC Encryption
K.Sumathi 1, K.Jose Triny2

1Dr.K.Sumathi, CSE, M.Kumarasamy College of Engineering, Karur, India.
2K.Jose Triny, CSE, M.Kumarasamy College of Engineering, Karur, India.

Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 1223-1227 | Volume-8 Issue-8, June 2019 | Retrieval Number: H6944068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: All sorts of external data and emerging applications as well as other existing applications are made manageable by means of implicating a well-formed methodology termed as cloud computing. Tactful statistical information or any kind resourceful information is likely to be distributed in public clouds using Attribute Based Encryption (ABE) scheme earlier. Later owing to overpriced pairing schemes accompanied with biased decryption procedures ABE has become unproductive for getting implemented to share information in an public cloud environment. In order to overcome that shortcoming for distributing information among public clouds Elliptic Curve Cryptography (ECC) Encryption scheme amalgamated with a secure auditing procedure is employed. This form of enriched security schemes proficiently suffices the original need of current cloud-based networking scenario.
Keyword: Cloud storage, Key distribution center, Security, Third Party Auditors (TPA).
Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy.