Survey Paper on Object Oriented Cryptographic Security for Runtime Entities( Vol-2,Issue-12,December - December 2016 ) |
|
Author(s): Prof. Supriya Sarkar, Sohina Hasan |
|
Keywords: |
|
Hierarchical inheritance, cryptree, cryptographic file system, Elliptical curve, Dual level key management, Chinese Remainder Theorem, cipher text policy attribute based encryption, Two level based Encryption construction. |
|
Abstract: |
|
With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies. |
|
Cite This Article: |
|
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex) | |
Share: |
|