This paper is published in Volume-6, Issue-3, 2020
Area
Computer Science
Author
Abymol Thankachan, Alpha Mathew
Org/Univ
College of Engineering Kidangoor, Kottayam, Kerala, India
Keywords
Cloud, data sharing, access control, security, privacy.
Citations
IEEE
Abymol Thankachan, Alpha Mathew. A survey on various encryption techniques, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Abymol Thankachan, Alpha Mathew (2020). A survey on various encryption techniques. International Journal of Advance Research, Ideas and Innovations in Technology, 6(3) www.IJARIIT.com.
MLA
Abymol Thankachan, Alpha Mathew. "A survey on various encryption techniques." International Journal of Advance Research, Ideas and Innovations in Technology 6.3 (2020). www.IJARIIT.com.
Abymol Thankachan, Alpha Mathew. A survey on various encryption techniques, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Abymol Thankachan, Alpha Mathew (2020). A survey on various encryption techniques. International Journal of Advance Research, Ideas and Innovations in Technology, 6(3) www.IJARIIT.com.
MLA
Abymol Thankachan, Alpha Mathew. "A survey on various encryption techniques." International Journal of Advance Research, Ideas and Innovations in Technology 6.3 (2020). www.IJARIIT.com.
Abstract
Cloud computing and social network change the way of healthcare by providing real-time data sharing in a cost-effective manner. Data sharing in the cloud is a technique that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to construction and the great conveniences provided by cloud services. The data owner is not able to control over their data, because the cloud service provider is a third-party provider. The main crisis with data sharing in the cloud is the privacy and security issues. Various techniques are available to support user privacy and secure data sharing. This paper focuses on various schemes to deal with secure data sharing such as identity-based encryption, proxy Re-encryption, ciphertext-PolicyAttributeBasedEncryptionandattributeBased Encryption.