Implementing Aggregate-Key for Sharing Data in Cloud Environment using Cryptographic Encryption
K. P. Kaliyamurthie1, G. Michael2, R. Elankavi3, Stephen Anto Jijo4
1K.P.Kaliyamurthie,Department of computer science and engineering ,Bharath Institute of Higher Education and Research, Chennai Tamilnadu, India.
2G.Michael,Department of computer science and engineering ,Bharath Institute of Higher Education and Research, Chennai Tamilnadu, India.
3R.Elankavi Department of computer science and engineering, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.
4Stephen Anto Jijo, Department of computer science and engineering, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.
Manuscript received on 07 July 2019 | Revised Manuscript received on 19 July 2019 | Manuscript Published on 23 August 2019 | PP: 957-959 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I32030789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3203.0789S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Data Information sharing is a fundamental comfort in scattered limit. In this paper, we prompt the best way to deal with safely, advantageously, and adaptably share information with others in appropriated accumulating. We portray new open key cryptosystems that produce relentless size figure messages to such an extent, that fruitful task of translating rights for any strategy of ciphertexts is conceivable. Everything considered, the mystery key holder can discharge an enduring size supreme key for flexible decisions of ciphertext set in dispersed accumulating, at any rate the other blended records outside the set stay classified .Key Words – Short Text Classification, Content based isolating, Policy based personalization, Online Social Networks sharing.
Keywords: Cryptographic, Multi Encryption Process, Data Forwading, Intergrity Checking.
Scope of the Article: Data Analytics