Muskan Talreja
Barkatullah University, Bhopal, Madhya Pradesh, India
Download PDFSecurity is necessary for sharing fragile Information in the cloud. Utilizing the real key makes the framework share the delicate Information without moving Keys for every single record. This framework employments Hilter kilter encryption standard for scrambling all the The Information followed by open key encryption. The users will get their data retrieved once they put the private key as well as a master key that they received from the sender. if the key is hacked during transmission, the suspicious attacker will not be able to get the data to decrypt as the data is secured by the private key.It is not mandatory to share key for each and every document because the user can decrypt the file using a master key. All information and data are extracted by the master secret key. so the data protected in different places, and user can use it anywhere.
Keywords: File Security Techniques; cloud computing; Advanced Encryption Standard (AES)
Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.