An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 2, Issue 3
Abstract
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order. If a receiver wants to retrieve a message when he is using a system with limited bandwidth, CPU and memory, then the ESC scheme may not work well. The computational cost for decryption is too high, because the receiver does not perform any partial decipherment. Based on the RSA signature, a Trapdoor Commitment scheme is proposed to improve the security level. This scheme allows the receiver to create a short trapdoor and send it to the Cloud Service Provider (CSP) before retrieving files or messages for finding out part of the cipher text. This scheme allows the sender to participate in the partial signature, so as to reduce the computational cost.
Authors and Affiliations
Palanikkumar D, Sowmya varshini M
Efficient Application of Selected Mapping with Clipping for PAPR Reduction in OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is an inimitable technology in wireless communication. High peak-to-average power ratio (PAPR) is a challenging issue in OFDM system. Large PAPR results in significant di...
Improving Throughput and Controlling Congestion Collapse in Mobile Ad Hoc Networks
Mobile ad hoc networks are collections of mobile nodes that can dynamically form temporary networks without the need for pre-existing network infrastructure or centralized administration. These nodes can be arbitrarily l...
Data Integrity and Dynamic Storage Way in Cloud Computing Resonance and Parametric Analysis of Planar Broad-Wall Longitudinal Slot Array Antennas
It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn?t have c...
Towards Realization of Large-Scale Botnet Probing Events
Today?s attack scenery is governed by Botnets. Botnet refer to a group of bots?a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious program...
Tree Based Scalable Secure Group CommunicationV-parameter Study of Silica-Air 1D Photonic Crystal Fiber by Modulating Geometrical Parameters at Different Optical Communication Ranges
In order to establish a group communication, a common key must be available with all the members of the group. The group key can be used for encrypting data between the group members or restricting access to the resource...