Secure Data Sharing Using Revocable-Storage Identity-Based Encryption

Secure Data Sharing Using Revocable-Storage Identity-Based Encryption

DOI: 10.4018/978-1-6684-6646-9.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Distributed computing provides flexible and informative information exchange and brings many benefits to both the general public and individuals. However, because the information often contains the most important data, there is a common lock that allows users to easily reuse cloud host information. Therefore, it is important for users to provide cryptographically enhanced access control to shared resources. Personality-based encryption is, for example, a promising encryption approach for building smart data sharing systems. Anyway, access to management is not a versatile solution. In such cases, if your permission is revoked from the database, it must be completely revoked from the cloud server, and you will not be able to retrieve your information once it has been revoked. It has many features of realizability, usefulness, and effectiveness and thus shows the correlation that shows the proposed method diagram used to build a practical and intelligent data provider structure.
Chapter Preview
Top

Literature Survey

This survey focuses on online social network connections. This is often related to actual interactions and can be used to predict trust between individuals. We suggest using these connections to build a continuous “social cloud” that allows people to use their knowledge resources within networking sites. In addition, you can use the environment modification techniques created to create internet structures for long-term collaboration with less privacy and security concerns than traditional cloud environments. Social markets are unusual in that they combine social and economic standards to facilitate trading. Used to facilitate trading (Chard, K et.al., 2011).

Complete Chapter List

Search this Book:
Reset