Secured Cloud Data Transmission using Cross ABE Algorithm
K. Chockalingam1, L. Velmurugan2

1K. Chockalingam,*Department of Computer Science, Research Scholar, Joseph Arts and Science College, Thirunavalur, India.
2Dr. L. Velmurugan, Department of Computer Science, Assistant Professor, Joseph Arts & Science College, Thirunavalur, India.
Manuscript received on January 24, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 29, 2020. | PP: 3803-3806 | Volume-9 Issue-3, February 2020. | Retrieval Number:  C5149029320/2020©BEIESP | DOI: 10.35940/ijeat.C5149.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: UCloud security is becoming more essential than ever with the tremendous development of delicate cloud data. The cloud information and services are located in massively scalable data centers and can be accessed anywhere. Unfortunately, the development of cloud users has been followed by an increase in cloud malicious activity. More and more vulnerabilities are being found, and fresh safety advisories are being released almost every day. Millions of customers surf the cloud for different reasons, so they need extremely secure and persistent services. The cloud storage system interconnect with the a load of potential security risks. So the cross encryption of Ciphertext Policy Attribute Based Encryption (CPAB) and Key Policy Attribute-based encryption algorithm which increases the security level in the encryption side. A segmentation part helps in splitting the encrypted file in storing the data in the cloud side, the Desegmentation part in the receiver side can easily combines spitted data into the single file for validation examine an authentication level in the received data. Here the cloud storage easily with the file fragmentation processes. This processes research over the storing mass amount of data on off- site installation, which can eliminate the cost in maintaining the physical hardware. Cloud’s future includes a much greater degree of privacy and authentication, particularly in extending the variety of apps. We suggest a straightforward data protection model where data is encrypted before it is introduced in the cloud using key policy attribute-based encryption to ensure data confidentiality and safety. The storing data is the most common application for the cloud server.
Keywords: Cloud computing, Attribute based Encryption, privacy, Security.