Loading

An Efficient Key-Accumulation Cryptosystem for Cloud
Tanvi Agrawal1, Ambuj Kumar Agrawal2, S.K. Singh3
1Tanvi Agrawal, Amity University, Lucknow (U.P), India.
2Dr. Ambuj Kumar Agrawal, Teerthanker Mahaveer University Moradabad (U.P), India.
3Prof, Dr. S. K. Singh, AIIT, Amity University, Lucknow (U.P), India.
Manuscript received on 28 March 2019 | Revised Manuscript received on 07 April 2019 | Manuscript Published on 11 April 2019 | PP: 152-156 | Volume-8 Issue-4C, April 2019 | Retrieval Number: D24360484C19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing has started to gain extensive appreciation inside the corporate world as well, because it has given permission to access the required resource as Internet. The process of accessing and sharing of the resources is performed in a very virtual and protected way so that a general user is not aware of the task that is performed. In this paper, we aim to derive a mechanism to make data safe and control the access of the sensitive information over the cloud servers.
Keywords: Authorization, Cloud Computing, Cryptosystem, Threats, Vulnerability.
Scope of the Article: Cloud Computing