An Attribute Based Secure Data Self-Destructing and Time Server
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Recent years all are using the cloud server. The reason of cloud server easy to use and having the security. Once we upload the file store to the cloud server then that files access the world wide and any time. Here access the cloud server from the many users so have changes to unauthorized user access the other users file. So we are providing the file key for storing file in cloud server. When user want the file from the cloud server that time must give the file keyset. In existing system user like to share the file into friends circle that time upload the file into cloud server. Once that friends are download the files from the cloud server. Then that files store in permanently at cloud server. This main disadvantage of this unauthorized user access the file and chances to miss use the files. So this is big challenge to store files with secure in cloud server. So we are learning in this paper how to overcome this problem and file store in secure. In proposed when user want to share the file into friends circle via cloud server that time give the key for file download. And here additionally user allocate the particular time interval for the access the files from the cloud server. When friends want to access the file. That time asking to file user. File user send the file key and also time interval. That time only friends are access the file. If before and after the time interval that file can’t access from the friends circle. This is mainly used for the secure the file in cloud server.
Authors and Affiliations
Bharath Kumar. B, Sakthivel. K, G. Senthil Kumar
Contribution of Foreign Direct Investment in India: Its Growth and Issues
Foreign Direct Investment acts as a bridge to fulfill the gap between investment and saving. In the process of economic development foreign capital helps to cover the domestic saving constraint and provide access to the...
Detection of Authenticity in Social Networks
Social networks are the most convenient and effective means of communication in past few years. Our study aims to verify the owners of social accounts, in order to eliminate the effect of any fake accounts on the people...
Batteryless Mobile using Supercapacitor with Wireless Charging
In the current world of technology, we introduce to many new electronic gadgets. As the rate of population increases the use of this electronic gadgets are also increasing rapidly. All this electronic gadgets are run on...
Laser Atmospheric Transmission Limitations in Optical Wireless Communication Systems Based on Different Transmission Levels for Short and Local areas Network Applications
This paper has presented optical wireless communication systems performance prediction based on different visibility levels for indoor, local, and wide area network applications s over wide range of the affecting parame...
Determination of Strength Analysis of Bus Body Carline through FEA
Buses are the foremost mode of road transportation. The design of the bus body depends mainly leading the performance constraint under various types of loading and operating circumstances besides those of the road condi...