A System to Minimize The Storing And Managing Secret Keys Expense Using KAC
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-size ciphertexts .In this transforming multiple keys as single secret key. The generated single secret key sent to others or be stored in a smart card with very limited secure storage. We provide if a user needs to classify his ciphertexts into more Than n classes, he can register for additional key pairs. Each class now is indexed by a 2-level index and the number of classes is increased by n for each added key. For our approach, at most 2 aggregate keys are needed. Eventually our approach is flexible and effective.
Authors and Affiliations
Nageswara Rao. M, K Rajesh
AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data
An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...
Technique to the Data Alignment for Accomplishing Accurate Annotation In Web Databases
Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsin...
Performance Analysis of RTOS with GPOS for Heart Rate and Temperature Measurement Wireless System Using Raspberry Pi
The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Me...
Improvisation of Identity, Trustworthiness and Privacy in Social Network
The expanding notoriety of informal community administrations (SNS), being utilized by a great many individuals ordinary, has emerged some security and protection issues. While clients must be allowed to pick which m...
Cloud Computing Used In Mobile Network
As a new mode of network applications, cloud computing is transforming the Internet computing infrastructure. Also the mobile applications and devices are developing rapidly. Cloud computing is anticipated to bring a...