Work place: UTD, RGPV Bhopal 462021, India
E-mail: santoshsahu@rgtu.net
Website:
Research Interests: Computer Science & Information Technology, Information Security, Information Systems
Biography
Prof. Santosh Sahu has completed his Bachelor’s Degree in Information Technology and gained his Masters in Technology (M.Tech) with the specialization in Information Technology. He has worked for 8 years as a lecturer in different colleges and recently he is an assistant professor in the IT department (M.E, M.TECH) in SOIT, UTD, RGPV University, Bhopal, India.
By Bhumika Dahat Nischol Mishra Santosh Sahu
DOI: https://doi.org/10.5815/ijcnis.2018.11.01, Pub. Date: 8 Nov. 2018
Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals