An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 2, Issue 3
Abstract
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order. If a receiver wants to retrieve a message when he is using a system with limited bandwidth, CPU and memory, then the ESC scheme may not work well. The computational cost for decryption is too high, because the receiver does not perform any partial decipherment. Based on the RSA signature, a Trapdoor Commitment scheme is proposed to improve the security level. This scheme allows the receiver to create a short trapdoor and send it to the Cloud Service Provider (CSP) before retrieving files or messages for finding out part of the cipher text. This scheme allows the sender to participate in the partial signature, so as to reduce the computational cost.
Authors and Affiliations
Palanikkumar D, Sowmya varshini M
An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks
A Mobile Adhoc Network is a communication medium that does not rely on secure infrastructure .It is a group of independent mobile nodes that can transfer to communicate each other via radio waves. These networks are full...
Efficient Application of Selected Mapping with Clipping for PAPR Reduction in OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is an inimitable technology in wireless communication. High peak-to-average power ratio (PAPR) is a challenging issue in OFDM system. Large PAPR results in significant di...
ANN, SVM and KNN Classifiers for Prognosis of Cardiac Ischemia- A Comparison
This research work provides the comparison of performance of Artificial Neural Network (ANN), Support vector machine (SVM) and K-Nearest-Neighbour (KNN) models for cardiac ischemia classification. The novelty of this wor...
Border Gateway Protocol Performance and Its Protection against Disturbed Denial of Service Attack
Now a day the internet has become very popular in the world. Simple work to complicated work you can accomplish by using internet. Such popularity leads to chances of exhaustion of Internet protocol version 4 which is cu...
Comparison of Cellular Automata and DSP Processors towards DSP Application
In this paper we have emphasized on alternative uses of Cellular Automata (CA) in Digital Signal Processing (DSP). The corollary of the distinction is centered on the parallel nature for both of the processors. For digit...