A Secure Data Sharing in an E-Commerce Site on a Cloud Based Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
Cloud computing provides services like infrastructure, software, applications and platform from a distant data centre to the client. Cloud computing has the advantage of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Privacy is always a concern in cloud computing because the service provider can access the data that is on the cloud at any time. Many cryptographic techniques are used to preserve data integrity from unauthorized users. The authenticity of the data in a insecure channel can be prevented using the cryptographic techniques and log generation scheme. This proposed system along with dynamic operation and public verifiability prevents adversary attack that takes place during the data sharing. This proposed system discusses the security issues involved in log management for a Secure Logging as a service and presents a design and implementation of a prototype delegating secure log manager. Main goal of a log manager in the third party auditor is to provide high bandwidth and low level inactivity. The sensitive information are kept in log files in cloud provider .The event that an attacker captures this server this system is likely to guarantee that the adversary will gain little or no information from the log files and to limit his ability to corrupt the log file. This system has implemented how to store secure log file in cloud and that file can be performed dynamic operation by the authorized users.
Authors and Affiliations
S. Lovely Jacinth Kirthana Kirthana. S, P. Durga Devi
Exergy Performance of the Environmentally Friendly Refrigerant Mixture: R365mfc and R152a
This work presents the exergy performance of new environmentally friendly refrigerants 1,1-difluoroethane (R152a) , 1,1,1,3,3-Pentafluorbutane (R365mfc) and particularly their mixture. A vapor compression refrigeration...
Assessment of Heavy Metals Levels in Some Commonly Consumed Species of Prawns in Southwestern Nigeria
Three different kinds of prawns (Macrobrachium Felicium (MF), Macrobrachium macrobrachium (MM) and Demoscaris Trispinose (DT)) were collected from Ilaje (water side) area of Ondo State, Nigeria. The concentrations of he...
A Novel Method to Resolve Artifact Errors on Retinal Images
The retina (fundus) has a very specific diagnostic role regarding human health. The eye is a window into the body responsible for sensing information in the visible light domain, thus, it is also suitable to make clinic...
Data Hiding Using Blind Algorithm of Steganography
The process of hiding messages or information within other non-secret text or data is called steganography. Steganography may be text, image, audio or video steganography. Digital image Steganography is popular because...
Searching Relevant Documents from Large Volume of Unstructured Database
In large organizations managing of data is very tedious task. these includes unstructured data such as images,videos,MP3 files, emails etc. The central aspect of research is to identify right document from unstructured...