A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
Role re-encryption is used to avoid privacy data leakage and also to avoid deduplication in a secure role reencryption system (SRRS). And also, checks for proof of ownership to identify whether the user is an authorized user or not. This is for efficiency. The role re-encryption method is to share the access key for the corresponding authorized user for accessing the particular file without the leakage of private data. In our project, we are using both the avoidance of text and digital images.doi:10.56726/irjmets31786 fatcat:isf23k5d7ncrrdjj7fur43t37a