IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 2 - Issue 4, April 2014 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Efficient Data Sharing Techniques To Improve The Security Usingnetworks

[Full Text]

 

AUTHOR(S)

K. SOWMIYA

 

KEYWORDS

 

ABSTRACT

Abstract: The present trends and spreads in data sharing in the internet and in social networks is unsecure .So nowadays people demanding for security .In such case, this paper helps to share the data in a secure way by encrypting the data and decrypt it .Though it has several features in decryption and encryption. Nowadays decryption done by using private keys .This common thing that is used is for security purpose .Thecypher textingis a new technique that is used forcryptographic purpose .Throughits work well it has only one drawback that is escrows problem. This problem can be solved easily by introducing new SFTP protocol.Hence implementation and proposed plan will manage and it will share the data securely on the internet .

 

REFERENCES

[1]. Attrapadung H. Imai, “conjunctive broadcast and attribute based encryption ,” proc paring 2012

[2]. D.Boneh ,M.K Franklin ,”identify based encryption from the weli paring ” proc CRYPTO 2010,LNCS Vol,2139,pp.243

[3]. M Chase , .S.S.M chow, “improving privacy and security in multi authority attribute based encryption ”proc .ACM conference on computer and communication security pp.134-130,2012

[4]. C.Dong,G.Russello, and N.Dulay, ” Shared and searchable encrypted data for untrusted servers ” in journal of computer security 2011

[5]. S.Yu,C.Wang ,K.Ren and W.Lou “ Achieving secure and scalable and fine grained data access control in cloud computing ”,in IEEE INFOCOM’10, 2011

[6]. S.Rafaeli, D.Hutchison,”A survey of key management for secure group communication ”, ACM computing surveys

[7]. K.C.Almeroth,M.H.Ammar,”multicast group behavior in the internet multicast backbone “,IEEE communication magazine

[8]. M.Pirretti, P.Traynor,P.McDaniel, B.Waters,”secure attribute based system “, proc. ACM,conference on computer and communication security 2008.

[9]. S.S.M.Chow ,”Removing Escrow from identify based encryption ”, proc PKC 2010

[10]. M.Belenkiy , J.Camenisch,M.Chase,M. Kohlwesis , A.able Anonymous Credentials ,”proc Crypto 2009