A CIPHER TEXT MULTI-SHARING CONTROL ON BIG DATA STORAGE
Journal Title: BEST : International Journal of Management, Information Technology and Engineering ( BEST : IJMITE ) - Year 2019, Vol 7, Issue 8
Abstract
Nowadays, users those who are accessing social media or health care applications are becoming more day by day. To store large volume data used by a software application, we had implemented secure storage service. “Big-Data” will have the capacity to store huge volume data and very fast data retrieval via services. Simultaneously, we consider privacy, data which gets stored via big-data application. Moreover, the application services share fine grained encrypted information. Data-owners will allow the end-user for sharing cipher-text data among some other third party service providers. In this paper, we had proposed cipher-text multi-sharing mechanism to attain privacy preserving data sharing big-data. The advantages of proxy-re-encryption and anonymous technique are listed below. 1, a cipher-text can be securely and conditionally shared between ‘n’ number of times. 2, without leaking knowledge of underlying message & identity of cipher-text sender or receiver.
The Impact of Inflation Uncertainty on the Resources and Expenditures in the Banking System of Iran
Banks are the basis for economic growth. Yet today the performance of their causal influence of asymmetric information and uncertainty, which could have a negative impact on overall economic performance in this study, th...
Strategic Supplier Partnership and its Impact on Business Performance: A Study on the Selected Hospitals in Nagpur Region
Strategic Supplier Partnership plays an important role in optimizing the costs and improving the quality of material being provided to the organisation. Service organisations like hospitals also have their purchase depar...
Agent-Based Convolution and Reinforcement Learning
The problem with the current models like Darwin-OP or Boston Dynamic’s ATLAS is their up-time, especially with increased number of joints. These models try mimicking the human motion; they end up using a lot of actuators...
LEADING TEAMS TO THE MISSION AND VISION OF THE ORGANIZATION
Leading teams to success that will provide a pathway to completion of objectives and goals is probably one the most difficult endeavors a leader can deal with. Many teams lack direction and are too static in their belief...
HYPER ATTRIBUTE BASED CRYPTOGRAPHIC METHOD TO SECURE CLOUD STORAGE
Many researchers have grabbed attention on cloud computing, due to its popularity and demand in the software market. This paper offers various strategies to protect or secure data at the database storage level in cloud b...