Distributed computing provides flexible and informative information exchange and brings many benefits to both the general public and individuals. However, because the information often contains the most important data, there is a common lock that allows users to easily reuse cloud host information. Therefore, it is important for users to provide cryptographically enhanced access control to shared resources. Personality-based encryption is, for example, a promising encryption approach for building smart data sharing systems. Anyway, access to management is not a versatile solution. In such cases, if your permission is revoked from the database, it must be completely revoked from the cloud server, and you will not be able to retrieve your information once it has been revoked. It has many features of realizability, usefulness, and effectiveness and thus shows the correlation that shows the proposed method diagram used to build a practical and intelligent data provider structure.
Sonia Jenifer RayenP. Divya BharathiV. RenukaR. Saranya
Maadala Chandra SekharKeerthi Kethineni
Jianghong WeiWenfen LiuXuexian Hu