EDITOR BOARD MEMBERS :  VIEW ALL

Dr Bikasih Thapa & Dr Maheswar Prasad (Nepal) - Hideo Wada MD PhD (japan) - Dr a Lavra Castrocatesana (Mexico) - Dr Mrs N.M. Hettiarachechui (Srilanka) - Dr Jorge Aldrete Velasco (Mexico) - Prof Hans Peter Kohler (Switzerland) - Dr Hermanus Suhartono S Sp.OG(K) PhD - Dr Isabel Pinheiro (Portugal) - Dr Suranga (Srilanka) - Jovia Dino Jansen Amsterdam,Holand - Hideo Wada MD PhD University Graduate School of Medicine Departement of Moleculer and Laboratory Medicine Japan - DR Bikash Thapa Internal Medicine Nepal University - DR Maheswar Prasad Internal Medicine Nepal University - Dr a Lavra Castro Castresana Colegio de Medicina interna de Mexico - Dr Suransa Manilgama University of Srilanka Internal Departement Medicine - Dr Mrs N.M. Hettiarachechui University of Medicine Srilanka - Dr Jorge Aldrete Velaso .Colegio de Medicina Interna de Mexico - Prof Hans Peter Kholer M.D FACD Profesor of Medicine University ot Switzerland - Dr Ramezan Ali Atace . Baqiyatallah University of Medical Sciences Departement of Micrology Tehran Iran - Ezekiel Wong Toh Yoon Dr. Gastroenterology of Japan - D Eric Beck,MD Bethesda Hospital Capitol Boelevard St Paul USA - Dr Emine Guderen Sahin Istambul University of Internal Medicine Turky - Dr Selmin Toplan Istambul University - Dr Nicholas New Australia - Dr Kughan Govinden. Tropical Infection of Internal Medicine Malaysia - Dr Godfrey M Rwegerera Princes Marina Hospital Bostwana -

Title : Effective File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Author : EDIGA KISHORE KUMAR GOWD, VIJAYA BHASKAR MADGULA, KUMMARA RANGA SWAMY

Abstract :

To manage the exponential growth of shared data, cloud computing has emerged as a top contender among application platforms. Users should encrypt their data before sharing it in order to keep it safe on the cloud. By using the cloud, customers with limited computer capabilities may access massive amounts of processing power, bandwidth, storage, and even relevant software that can be shared on an as-needed basis, all while paying for what they really need. As the first barrier against unauthorised access to shared information, access management is of the utmost importance. On the one hand, sensitive data includes outsourced computation tasks, which may contain things like business financial records, private research data, and personally identifiable health information. Encrypting sensitive data before outsourcing it is essential for preventing illicit data leaks and assuring end-to-end security. guarantee the security of data stored online and elsewhere. Important exposur

[ PDF ]

Editor Board
Editor in chief

Dr. Arend L Mapanawang, Sp.PD, FINASIM, PhD

Subject Area

Every article submitted to IJHMCR is screened by Turnitin software.

Indexing

PENGUNJUNG KAMI DARI BERBAGAI BELAHAN DUNIA