A Secure Mona Protocol for Data Sharing In Un-Trusted Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
Cloud computing provides different services economically and efficiently to share many resources among cloud users with low maintenance cost. But unfortunately, during this sharing process data preservation and data integration became a challenging issue for the researcher. This paper, we propose aSecure monaprotocol for data sharing in un-trusted cloud scheme called Mona protocol, for dynamic cloud groups by introducing group signature, file security key and dynamic encryption techniques.This technique helps all thecloud user to share data with others. This presents an efficient result to support the authors claim that it gives an best result as compare to the existing encryption technique.
Authors and Affiliations
VennapusaPrakash Reddy, B. VijayaBhaskar Reddy
Detecting of Disconnected from Source (DOS) and Connected but a Cut Occurred Somewhere (CCOS) in Wireless Sensor Networks
A wireless sensor network can get separated into multiple connected sensors .but some nodes are failure due to mechanical, electrical problems, environmental degradation battery depletion or hostile tampering. which...
Unobservable Secure Proactive Routing Protocol For Fast & Secure Transmission
a mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies. it allowing people and devices to seamlessly communicate without any p...
Speech Recognition in Marathi Language on Android O.S.
Speech is the basic mode of communication among human beings. For about four decades human beings have been dreaming of an ”intelligent machine” which can master the natural speech. Speech recognition is the process...
Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links
The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There aris...
An Approach to reduce Non-linearity of HIPERLAN/2 system using Neural Network
Simulation of ETSI’s High Performance Local Area Network Type 2(HIPERLAN/2) is presented. In this paper we present performance of HIPERLAN/2 model via a MATLAB/Simulink simulation with the original MATLAB/Simulink mo...