A Brief Survey on Encryption Schemes in Cloud Environments
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and they are all third party.It focuses on a technique to Hierarchical Attribute Set Based Encryption (HASBE); it is proposed by the Cipher Policy attribute-based encryption (CP-ABE). It achieves both flexibility and fine-grained access control of data in cloud not only the scalability. It stores the data in encrypted form for privacy protection. Cloud system is responsible for both tasks on storage and encryption or decryption of data. In this paper I provide a technique called Hierarchical Attribute set based Encryption(HASBE) to give security and fine grained access control to the users of cloud computing. It was an enhancement for the technique called Attribute based Encryption(ABE) which is inflexible to handle comple x control.
Authors and Affiliations
S. M . Hema Latha , S. Ganesh
Analysis Study of Fuzzy Logic Using Blood Pressure Readings
Fuzzy logic is a form of many-valued logic or probabilistic logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (where variables may take on true or false v...
IRIS AUTHENTICATION USING PSO
The paper proposes a wavelet probabilistic neural network (WPNN) for iris biometric classifier. The WPNN combines wavelet neural network and probabilistic neural network for a new classifier model which will be...
Implementation and Analysis of Modified Double Precision Interval Arithmetic Array Multiplication
This paper presents the design of a 64 bit array multiplier that performs interval multiplication. This multiplier requires carry save adders instead of full adders that reduces the delay i n r e s p e c t o f co...
A Psychological Approach in Acquiring Second Language
The learning of English language in schools or colleges proves to be a tough task in which it often doesn’t give the satisfactory result. Since the young people spend years of time in studying the English language, they...
IP Anycast Architecture
This paper illustrates the methodology and architecture for network addressing and routing in which datagram packets routed through mathematical topological nearest node in a cluster of potential receivers that a...