A Multi User Data Share For Data Privacy and Defend Unauthorized Access
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 7
Abstract
A hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and an adjusted three-layer structure is proposed. Varying from the current ideal models, for example, the HABE calculation and the first three-layer structure, the novel plan essentially concentrates on the information preparing, putting away and getting to, which is intended to guarantee the application clients with lawful get to specialists to get comparing detecting information and to limit unlawful clients and unapproved legitimate clients access the information, the proposed promising worldview makes it to a great degree appropriate for the portable distributed computing based worldview. What ought to be underlined is that the most imperative highlight of all in the proposed work can be depicted as that the altered three-layer structure is intended for understanding the security issues.
Authors and Affiliations
Konakalla Vishnu Priyanka| Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Vakkalagadda Rajesh Babu | Dept. of CSE,ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh
An Enhanced IUPQC Controller to Provide Grid Voltage Regulation
This paper shows an enhanced controller for the double topology of the brought unified power quality conditioner (iUPQC) developing its materialness in power-quality remuneration, and additionally in smaller scale ne...
An Efficient Scalable Data Sharing In Cloud Storage Using Key Aggregate Encryption
In Cloud Computing data partaking is better concept on daily functions. and security is important functionality. Previously We describe public key cryptosystem . But these type crypto systems failure on maintain keys...
Automated Student Result Analyzer
The faculty of various colleges are facing overhead analyzing the results of students. Excel sheets are being used for percentage calculation, counting the number of backlogs, listing students within a particular ran...
A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours
A distributed solution for NPV any node in a mobile ad hoc network to verify the position of its communication neighbours without depending on a priori trustworthy nodes. In absence of a priori trusted nodes the disc...
Digital Signature and Key Agreement
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the fi...