Nischol Mishra

Work place: UTD, RGPV Bhopal 462021, India

E-mail: nishchol@rgtu.net

Website:

Research Interests: Applied computer science, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science

Biography

Dr. Nishchol Mishra has completed his Bachelor’s Degree and Masters Degree in Computer science and he has awarded in P.hd with specialization in computer science. He is currently an Associate professor in the Department of Information technology (M.E, M.TECH) in SOIT UTD, RGPV University, Bhopal, India and he has 15 years’ experience for teaching.

Author Articles
Hybrid KP-ABE Algorithm with Time Bounded Access Control for Cloud Data Security

By Bhumika Dahat Nischol Mishra Santosh Sahu

DOI: https://doi.org/10.5815/ijcnis.2018.11.01, Pub. Date: 8 Nov. 2018

Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.

[...] Read more.
Other Articles