International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 147 | Views: 234 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Engineering | India | Volume 8 Issue 8, August 2019


An Advanced Implementation for Cryptography and Encryption in Cloud Computing Using Identity Based Encryption Techniques

Indra Kishor [3]


Abstract: Cloud computing provides clients with a virtual computing infrastructure on top of which they can store data and run applications. While the benefits of cloud computing are clear, it introduces new security challenges since cloud operators are expected to manipulate client data without necessarily being fully trusted. We are designing cryptographic primitives and protocols tailored to the setting of cloud computing, attempting to strike a balance between security, efficiency and functionality. Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers which is not within the same trusted domain as data owners. To keep sensitive user data confidential against un trusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. This paper explores various data encryption techniques such as homophormic encryption, searchable and structured encryption, Identity based encryption, signature based encryption etc.


Keywords: Encryption, Cryptography, Cloud Computing Security


Edition: Volume 8 Issue 8, August 2019,


Pages: 1357 - 1360


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top