Skip to main content


Securing File sharing System in cloud environment using AES Algorithm

Issue Abstract

Abstract
Now days, the train sharing is fully useful for everyone. Some kind of websites or operation gave authorization to partake a train along with their pall/ garçon authorization. In any case, participating coffers among numerous guests in the pall is a grueling issue. The proposed scheme gives the installation of securely storing and participating the information for dynamic gatherings in the pall. By exercising encryption strategies any pall guests can consummately partake their information in the trusted pall. Information proprietor can store the record without uncovering their personality to others in the pall. cancellation of the customer happens without refreshing the private keys of the rest of the guests. Information proprietor or Group Manager can have the capacity to cancel the record which is stored in the pall. The train sharing can be done by further number of druggies at the same time. The druggies used to partake the train in pall to secure the train data. The receiver will be downloading the train from the pall to decipher the train data. This increases the security while participating the train between two druggies. The receiver will be entering the unique key for downloading the train.


Author Information
B. Nagesh
Issue No
5
Volume No
4
Issue Publish Date
05 May 2022
Issue Pages
35-40

Issue References

References 
1. Mahajan, Prerna and Abhishek Sachdeva, 2013. A Study of Encryption Algorithms AES, DES and RSA for security. Worldwide Journal of Computer Science and Research in Computer Science and Software
2. Rijmen, Vincent and Joan Daemen, 2001. High level encryption standard. Procedures of Federal Information Processing Standards Publications, National Institute of Standards and Technology, pp: 1922.
3. Dhongade, Sudhir, et al., 2015. An Efficient Certificateless Encryption for Secure Data Sharing Over the Network Using AES-128 and AES-256..
4. Benson, Calum, Matthias Muller-Prove and Jiri Mzourek, 2004. Proficient convenience in open source projects: GNOME, OpenOffice. organization, NetBeans. CHI'04 expanded abstracts on Human Factors in Computing Systems. ACM, 2004.
5. Granado-Criado, José M., et al., 2010. Another approach to execute the AES calculation utilizing fractional and dynamic reconfiguration. Coordination, Fig. 22: Raw information caught by wireshark the VLSI Journal, 43(1): 72-80.
6. Balakrishnan, Bhargav, 2010. Three Tier Encryption Algorithm for Secure File Transfer. PC Engineering and Applications (ICCEA), 2010 Second International Conference on. Vol. 2. IEEE, 2010.