2022
DOI: 10.22266/ijies2022.0430.05
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced CP-ABE with RSA for Secure and Revocable Data Transmission of Big Data in Cloud

Abstract: Cloud computing is a diversified domain and is a huge phenomenon that is a widely preferred technology in the current times. The users are unable to utilize cloud computing to the maximum, due to challenges in the security issues. To store sensitive or useful data in an insecure region is not an option for the user. Various techniques have been developed to provide security for the big data in the cloud. During voluminous data transmissions, it will not maintain the end-to-end security and the prevailing appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Using the hybrid system, the user will utilize their private key to obtain the decrypted data after the server has presented the encrypted data to the decryption process. In [12] presented an improved CP-ABE with an RSA algorithm to secure outsourced big data stored on cloud servers and to restrict access to, disseminate, and safeguard information. The five stages of the proposed model's activities setup, user key generation, data encryption & decryption, and revocation perform actions that successfully identify the users who decipher the ciphertexts during decryption.…”
Section: Related Workmentioning
confidence: 99%
“…Using the hybrid system, the user will utilize their private key to obtain the decrypted data after the server has presented the encrypted data to the decryption process. In [12] presented an improved CP-ABE with an RSA algorithm to secure outsourced big data stored on cloud servers and to restrict access to, disseminate, and safeguard information. The five stages of the proposed model's activities setup, user key generation, data encryption & decryption, and revocation perform actions that successfully identify the users who decipher the ciphertexts during decryption.…”
Section: Related Workmentioning
confidence: 99%