A Secure Mona Protocol for Data Sharing In Un-Trusted Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
Cloud computing provides different services economically and efficiently to share many resources among cloud users with low maintenance cost. But unfortunately, during this sharing process data preservation and data integration became a challenging issue for the researcher. This paper, we propose aSecure monaprotocol for data sharing in un-trusted cloud scheme called Mona protocol, for dynamic cloud groups by introducing group signature, file security key and dynamic encryption techniques.This technique helps all thecloud user to share data with others. This presents an efficient result to support the authors claim that it gives an best result as compare to the existing encryption technique.
Authors and Affiliations
VennapusaPrakash Reddy, B. VijayaBhaskar Reddy
Outsourced Similarity Search on Metric Data Assets
Similarity querying of metric data which is stored in cloud is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server fo...
A Novel Strategy to Maximize the modulation index Under Unbalanced DC Sources
In this paper a new NVM (Neutral modulation method) technique has been proposed to achieve balanced output in the multilevel cascaded inverter (MLCI) operating under unbalanced DC conditions. In order to examine thes...
Design of On-line Interactive Data Acquisition and Control System for Embedded Applications
In various Internet applications based on the client/server architecture, it is better to use embedded WEB server other than PC server for decreasing volume, cost and power consumption. The paper introduces the desig...
A Comprehensive Review of Cluster-Based Energy Efficient Routing Protocols in Wireless Sensor Networks
Wireless sensor networks(WSNs) consists of large number of multifunctional sensor nodes. Routing protocols developed for other adhoc networks cannot be applied directly in WSN because of the energy constraint of the s...
Wireless Mesh Network Deployed in Disaster Area using Gateway Selection
As known from the history, communication services turns out to be exceedinglyimperative after calamity strike. Wireless Mesh network (WMN) serves as a cost effective technology that yield backbone infrastructure to p...