A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create fake user secrets. Given such fake user secrets, outside coercers can only get hold of phony data from a user’s stored cipher text. Once coercers imagine the received secrets are genuine, they will be content and more prominently cloud storage providers will not have exposed any real secrets. Consequently, user isolation is still protected. This concept comes from a special kind of encryption scheme called deniable encryption. Deniable encryption absorb senders and receivers form convincing fake evidence of forged data in cipher texts such that outside coercers are contented.
Authors and Affiliations
P. Aparna| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India
Web Based Fault Detection System
Embedded systems became an important part of our life. Addressing functional safety is a major challenge with increasing complexity. Typical examples of safety-critical embedded systems include vehicle safety or drive...
Efficient Scheme For Payment Minimization And Qos Services To Clients In Cloud
A new technique namely payment minimization error-tolerant algorithm which reduces the payment to clients is proposed in this paper.From cloud organization suppliers' perspective, advantage is a champion amongst the...
CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
In a remote mHealth observing framework a customer could mastermind compact sensors in remote body sensor systems to gather different physiological information, for example, circulatory strain (BP), breathing rate (B...
An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks
The self-configuring ability of nodes in MANET absolutes it admired among essential mission applications like military use or emergency recovery. The mobility and scalability carried by wireless network ended it poss...
Steganography with BSS-RSA-LSB technique: A new approach to Steganography
Security of information plays a vital role in data transmission. For this purpose steganography and cryptography is plays a major role. Steganography embed a text into cover image and cryptography convert plain text i...