A Multi User Data Share For Data Privacy and Defend Unauthorized Access
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 7
Abstract
A hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and an adjusted three-layer structure is proposed. Varying from the current ideal models, for example, the HABE calculation and the first three-layer structure, the novel plan essentially concentrates on the information preparing, putting away and getting to, which is intended to guarantee the application clients with lawful get to specialists to get comparing detecting information and to limit unlawful clients and unapproved legitimate clients access the information, the proposed promising worldview makes it to a great degree appropriate for the portable distributed computing based worldview. What ought to be underlined is that the most imperative highlight of all in the proposed work can be depicted as that the altered three-layer structure is intended for understanding the security issues.
Authors and Affiliations
Konakalla Vishnu Priyanka| Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Vakkalagadda Rajesh Babu | Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh
Design and Analysis of a Propeller Shaft in CAE tool and ANSYS
A Propeller Shaft is a device on which a propeller is attached to and transfers the power from the engine to the propeller. In the design of automobiles, the industry is exploiting in order to obtain reduction of wei...
Explicit Uncertainty word directing through Data Mining
Searching a keyword on an enormous a colossal is somewhat easier, however the search over a enlarge range of structured and connected information creates a problem. Routing keywords solely to applicable sources will...
Performance Analysis of Wavelet Packet Based SPHIT Algorithm
The necessity in image compression continuously grows during the last decade. An image compression algorithm based on wavelet packet transform is introduced. This paper introduces an implementation of wavelet packet...
A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users
The objective is to consent users to issue queries for content stored on other smart phones wherever in the network and to measure the chances of obtaining the information needed. We take for granted that smart phone...
Age-Invariant Recognition for Classifying Human Faces by Fusion of Shape and Texture Features
Face recognition plays an important role in identifying a person from a set of test imagesused for personal identification, but an individual poses a serious problem in recognizing the facial images whenever age vari...