{"title":"An Enhancing the Security of Cloud Data via an Attribute-Based Encryption Model and Linked Hashing","authors":"Abhilash Kumar Saxena, R. Mathur","doi":"10.1109/ICERECT56837.2022.10060101","DOIUrl":null,"url":null,"abstract":"With the present IT, the sky is the limit on the web through sent thinking, permitting us to make, coordinate, use, and adjust sites, associations, and cutoff points. Most frequently, cryptography is used. Cryptography is the investigation of putting together figures, block figures, stream codes, and hash powers. Security associations like underwriting, accessibility, assurance, legitimacy, and non-repudiation ought to be upheld by cryptographic procedures in the cloud. It offers an attractive design with a large information portion to ensure the security of these organizations. The purpose of this work is to provide guidance on how best to address the security of scattered storage using a combination of hashing and encryption functions. Using Netbeans IDE 8.0.2, a JDK 1.7 device, and EyeOS 2.6 as the cloud tier, he proposes to perform his two calculations of Rivest-Shamir-Adleman and the Huge Level Encryption Standard on secure hash gauges. increase. This completes on Ubuntu 15.03.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICERECT56837.2022.10060101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the present IT, the sky is the limit on the web through sent thinking, permitting us to make, coordinate, use, and adjust sites, associations, and cutoff points. Most frequently, cryptography is used. Cryptography is the investigation of putting together figures, block figures, stream codes, and hash powers. Security associations like underwriting, accessibility, assurance, legitimacy, and non-repudiation ought to be upheld by cryptographic procedures in the cloud. It offers an attractive design with a large information portion to ensure the security of these organizations. The purpose of this work is to provide guidance on how best to address the security of scattered storage using a combination of hashing and encryption functions. Using Netbeans IDE 8.0.2, a JDK 1.7 device, and EyeOS 2.6 as the cloud tier, he proposes to perform his two calculations of Rivest-Shamir-Adleman and the Huge Level Encryption Standard on secure hash gauges. increase. This completes on Ubuntu 15.03.