Nt1330 Unit 5 Assignment 1

Words: 1222
Pages: 5

Setup (1λ, n):performed by the data owner to arrange anaccount on an untrusted server. On input a securitylevel parameter 1λ and it outturns the public systemargument param, which is omitted from the inputof the other algorithms for brevity.
KeyGen:performed by the data owner to randomlygenerate a public/master-secret key pair (pk,msk).
FileUpload: It encrypts the File withConvergent Encryption applying 256-bit Blowfish algorithmwhere the convergent key is from MD-5 Hashing of the fileand before uploading the file in to the cloud server, server will be perform duplicate check with help of hashing of the file.
Key-Encryption:To preventing lose of Convergent Encryption Data Owner will encrypt the
Convergent key with public-key pk,and send the master-secret key to Users.
FileDownload:Data Users can access the file which is shared by Data Owner. Here User can
…show more content…
A square characterizes a source(originator) or destination of framework information
2. An bolt distinguishes information stream. It is the pipeline through which the data streams
3. A circle or an air pocket speaks to a procedure that changes approaching information stream into active information streams.
4. An open rectangle is an information store, information very still or a brief archive of information.

Process that transforms data flow.

Source or Destination of data

Data