A Secure Data Sharing in an E-Commerce Site on a Cloud Based Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 5
Abstract
Cloud computing provides services like infrastructure, software, applications and platform from a distant data centre to the client. Cloud computing has the advantage of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Privacy is always a concern in cloud computing because the service provider can access the data that is on the cloud at any time. Many cryptographic techniques are used to preserve data integrity from unauthorized users. The authenticity of the data in a insecure channel can be prevented using the cryptographic techniques and log generation scheme. This proposed system along with dynamic operation and public verifiability prevents adversary attack that takes place during the data sharing. This proposed system discusses the security issues involved in log management for a Secure Logging as a service and presents a design and implementation of a prototype delegating secure log manager. Main goal of a log manager in the third party auditor is to provide high bandwidth and low level inactivity. The sensitive information are kept in log files in cloud provider .The event that an attacker captures this server this system is likely to guarantee that the adversary will gain little or no information from the log files and to limit his ability to corrupt the log file. This system has implemented how to store secure log file in cloud and that file can be performed dynamic operation by the authorized users.
Authors and Affiliations
S. Lovely Jacinth Kirthana Kirthana. S, P. Durga Devi
Development of Low Power Micro Inverter for Use In House Hold Applications
The paper presents the design of a single phase low power solar micro inverter that can be used in homes for low power applications. The basic idea behind this research is to make most use of solar energy in operating s...
Secure Data Aggregation Technique in the Existence of Conspiracy Attacks for WSN
Network security implicates the authorization of access to data in a network, which is precise the network administrator. Wireless Sensor Network (WSN) states to a set of spatially isolated and committed sensors for wat...
Biogenic Synthesis,Characterization of Silver Nanoparticles using Tabernaemontana Divaricata and Polianthes Tuberosa Flower Extract and Evaluation of Their Antibacterial Activities
The importance of Tabernaemontana divaricata ,Polianthes tuberosa flower and Silver nanoparticles as revealed by various literature resources, we planned to carry out biogenic synthesis of Silver nanoparticles using the...
Digital Voting Machine
This is an interesting project which uses 8051 microcontrollers as its brain. The project is designed for four participants. Voters can poll their vote to any one of the participant. In this project, one port is dedicat...
Design of Broadband Rectangular Ring Patch Antenna for GSM-900, DCS- 1800 and Wi-Fi Bands
The low-profiled broadband multi-frequency double-layer patch antenna which has seven patches with different resonant frequencies are placed together on one plane, operates at three bands that is GSM 900, DCS 1800 and W...