Guarded dual authentication based DRM with resurgence dynamic encryption techniques

Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algo...

Full description

Saved in:
Bibliographic Details
Published in:Enterprise information systems Vol. 13; no. 3; pp. 257 - 280
Main Authors: Agarwal, Neha, Rana, Ajay, Pandey, J.P.
Format: Journal Article
Language:English
Published: Taylor & Francis 16.03.2019
Subjects:
ISSN:1751-7575, 1751-7583
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving.
ISSN:1751-7575
1751-7583
DOI:10.1080/17517575.2018.1527041