A Secure Mona Protocol for Data Sharing In Un-Trusted Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
Cloud computing provides different services economically and efficiently to share many resources among cloud users with low maintenance cost. But unfortunately, during this sharing process data preservation and data integration became a challenging issue for the researcher. This paper, we propose aSecure monaprotocol for data sharing in un-trusted cloud scheme called Mona protocol, for dynamic cloud groups by introducing group signature, file security key and dynamic encryption techniques.This technique helps all thecloud user to share data with others. This presents an efficient result to support the authors claim that it gives an best result as compare to the existing encryption technique.
Authors and Affiliations
VennapusaPrakash Reddy, B. VijayaBhaskar Reddy
A Mustang Security User Authentication Scheme Based On Graphical Password
In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using a...
Optimum Loss Allocation in Radial Distribution Systems
In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss...
Admittance Loading Of Dielectric Loaded Inclined Slots In The Narrow Wall Of A H-Plane Tee Junction
Slotted waveguide antennas find applications in microwave communication and radar systems requiring narrow beam or shaped beam patterns because of its compactness. They are particularly useful in airborne, space craft...
Technique For Content-Based Filtering On Unwanted Messages Posted On OSN User Walls
Every day constant communications entail the swap of several types of content as well as free text, image, audio, and video data. Online Social Networks (OSNs) are today one of the most well-liked interactive medium...
Detection of DDos Attack using HCIF Algorithm in Cloud Computing
Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...