A Secure Mona Protocol for Data Sharing In Un-Trusted Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
Cloud computing provides different services economically and efficiently to share many resources among cloud users with low maintenance cost. But unfortunately, during this sharing process data preservation and data integration became a challenging issue for the researcher. This paper, we propose aSecure monaprotocol for data sharing in un-trusted cloud scheme called Mona protocol, for dynamic cloud groups by introducing group signature, file security key and dynamic encryption techniques.This technique helps all thecloud user to share data with others. This presents an efficient result to support the authors claim that it gives an best result as compare to the existing encryption technique.
Authors and Affiliations
VennapusaPrakash Reddy, B. VijayaBhaskar Reddy
Feedback Driven Load Profile for Software Applications
Running a Preproduction system load testing with a feedback from Production system is a vital for the strength of the Production system against Performance Failures. During Performance Testing Lifecycle in two importa...
Survey of Techniques of High Level Semantic Based Image Retrieval
This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...
Concealment safeguarding delegated access control in shared clouds
Cloud computing, as a developing computing standard. Cloud computing empowers clients to remotely store their information in a cloud furthermore profit by administrations on-interest. With fast improvement of Cloud c...
Implementation Of Fast rate Power Allocation Utilizing Duality gap in OFDM Systems
In this letter, we propose a power allocation strategy for orthogonal frequency division multiplexing (OFDM) systems. To achieve the maximum capacity, the proposed power allocation strategy iteratively tunes the amoun...
Intrusion Detection System (IDS) for Wireless Ad-hoc Networks using Evolution Identification on Streaming Network Data for Detecting Unknown Network Attacks
Over last few decades design of Network Intrusion Detection System (NIDS) has been a challenging problem faced by research community. Although various approaches have been proposed to design efficient NIDS the engin...