Santosh Sahu

Work place: UTD, RGPV Bhopal 462021, India

E-mail: santoshsahu@rgtu.net

Website:

Research Interests: Computer Science & Information Technology, Information Security, Information Systems

Biography

Prof. Santosh Sahu has completed his Bachelor’s Degree in Information Technology and gained his Masters in Technology (M.Tech) with the specialization in Information Technology. He has worked for 8 years as a lecturer in different colleges and recently he is an assistant professor in the IT department (M.E, M.TECH) in SOIT, UTD, RGPV University, Bhopal, India.

Author Articles
Hybrid KP-ABE Algorithm with Time Bounded Access Control for Cloud Data Security

By Bhumika Dahat Nischol Mishra Santosh Sahu

DOI: https://doi.org/10.5815/ijcnis.2018.11.01, Pub. Date: 8 Nov. 2018

Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.

[...] Read more.
Other Articles