Professional Documents
Culture Documents
Seminar 3
Seminar 3
Presented By
Swapnil S. Jagtap
Under The Guidance of
Dr. D. B. Hanchate
2 Literature Survey
4 Block Diagram
5 Flowchart
6 Algorithm
7 Comparison
8 Conclusion
9 References
Introduction
The Cloud Service Provider (CSP) has full control of the outsourced data;
it may learn some additional information from that data therefore some
problems arise in the circumstance.
To maintain the security of the data access control rights, restrictions and
privileges for an individual are established.
The sensitive data is encrypted before outsourcing to the cloud.
Efficient and reliable ciphertext encryption techniques.
F(xL) = ((S1,a + S2,b mod 232 ) XOR S3,c) + S4,d mod 232