Abstract: Any large-scale data sharing system needs this quality more than others because if a user accidentally discloses sensitive information, the owner of the data will find it harder to keep the information secure. For data owners, sharing their data on servers or in the cloud presents many difficulties. These methods are crucial for managing keys shared by the data owner. The trustworthy authority will be introduced in this article in order to authenticate users who have access to cloud data. The trustworthy authority generates the key using the SHA algorithm, and both the owner and the user will have access to it. The trusted authority module computes a hash value using the MD-5 method after receiving an AES-encrypted file from the data owner. a file is sent to the CSP module by a trusted authority for cloud storage.

Keywords: SHA algorithm, AES algorithm, MD-5 algorithm.


PDF | DOI: 10.17148/IJARCCE.2023.124182

Open chat
Chat with IJARCCE