Work place: UTD, RGPV Bhopal 462021, India
E-mail: nishchol@rgtu.net
Website:
Research Interests: Applied computer science, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science
Biography
Dr. Nishchol Mishra has completed his Bachelor’s Degree and Masters Degree in Computer science and he has awarded in P.hd with specialization in computer science. He is currently an Associate professor in the Department of Information technology (M.E, M.TECH) in SOIT UTD, RGPV University, Bhopal, India and he has 15 years’ experience for teaching.
By Bhumika Dahat Nischol Mishra Santosh Sahu
DOI: https://doi.org/10.5815/ijcnis.2018.11.01, Pub. Date: 8 Nov. 2018
Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals