Bilinear Pairings Technique on Concrete ID-PUIC Protocol
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 6
Abstract
We propose a novel intermediary arranged information transferring and remote information uprightness checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, framework model and security display. At that point, a solid ID-PUIC protocol is planned by utilizing the bilinear pairings. The proposed ID-PUIC protocol is provably secure in view of the hardness of CDH (computational Diffie-Hellman) issue. Our ID-PUIC protocol is additionally productive and adaptable. In view of the first customer's approval, the proposed IDPUIC protocol can understand private remote information uprightness checking, appointed remote information integrity checking and open remote information integrity checking.
Authors and Affiliations
Mandala Prem Srujan| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Dr. P. Bala Krishna Prasad| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh
Implementing Efficient Search Results and Navigation in website
Designing structured website and organizing search results in website is Challenging task. For this we propose mathematical programming model to improve user navigation as well as novel search interface that enables...
Haze monitoring in wireless systems using ARM7 controller
The overwhelming haze, depicted as a pall of smoke brought about boundless health problems particularly among the elderly, the youthful and children. Haze is a climatic wonder where clean, smoke and different particl...
A Clustering-Based Shifting Technique To Align Data Units In Web Data Bases
An increasing number of databases have become web available through HTML form based search interfaces. The data units return from the underlying database are repeatedly encoded into the result pages dynamically for h...
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...
Simulation of an Inverter-Based Dg System by Using Voltage Control of DC Link for Islanding Detection
This paper presents a novel strategy for islanding detection of distributed generation (DG). During islanding condition the main idea of this paper is to change the dc-link voltage considering the PCC voltage changes...