Call for papers :

Submission Last Date 28/02/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
A proficient File Level ABE Technique in Cloud Management Dynamic Encoder
Abstract
Ciphertext-policy characteristic-based totally encryption (CP-ABE) antiquated a freshest encryption equipment to work out the difficult problem of certain photograph collaborate perplex computing. The communal items files generally own the tone of multilevel grouping, in particular within the square of healthcare and the navy. However, the ranking formation of mutual files has not been explored in CP-ABE. In this one look at, an efficient file pecking order characteristic-primarily based encryption approach is scheduled in clutter computing. The coat get right of entry to homes are unified proper right into a unique access agency, and then, the hierarchic files are encrypted using the unified get right of access to network. The cipher text components related to attributes might be commonplace all files [1]. Therefore, the two cipher text cache and chance loss of encryption are rescued. Moreover, the counseled suggestion is confirmed approaching reliable much less than the conventional speculation. Experimental duplication indicates a widely known the advocated approach may be very efficient in terms of encryption and illumination. With approach of the files growing, a few super benefits of our scenario become more and more conspicuous.
KeyWord
Cloud computing, data sharing, file hierarchy, cipher text-policy, attribute-based encryption.
Others Details
Paper Id : 71081
Author Name : G.SUDHA RANI
Co-Author Name(s) : U.SIVAJIDr. R. CHINA APPALA NAIDU
Volume/Issue No : Volume 05 Issue 02
Page No : 1-5
DOI Number : DOI:10.21090/IJAERD.71081
Publication Date : 2018-02-03
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406