ijaers social
google plus

International Journal of Advanced Engineering, Management and Science

Survey Paper on Object Oriented Cryptographic Security for Runtime Entities

( Vol-2,Issue-12,December 2016 )

Author(s): Prof. Supriya Sarkar, Sohina Hasan

Total View : 908
Downloads : 164
Page No: 2112-2116
ijaems crossref doiDOI:


Hierarchical inheritance, cryptree, cryptographic file system, Elliptical curve, Dual level key management, Chinese Remainder Theorem, cipher text policy attribute based encryption, Two level based Encryption construction.


With the advent of complex systems the need for large data storage with less space utility & high performance have become the vital features. Another important concern of the data is the security which is assured via the cryptographic techniques implemented at all levels of data storage. In this survey paper we introduce the concept of security between two hierarchical data accesses and propose the concept of hierarchical cryptography between data of different classes of different hierarchies.

Cite This Article:
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)