Distributed Access Control With Unknown Validation Of Information Stored In Clouds
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
We propose another decentralized access control plan for secure information storage in clouds that backings anonymous validation. In the proposed plan, the cloud checks the arrangement's legitimacy without knowing the client's identity before storing information. Our plan likewise has the included element of access control in which just legitimate clients have the capacity to decrypt the stored data. The plan counteracts replay attacks and backings creation, change, and perusing information stored in the cloud. We likewise address client repudiation. Also, our verification and access control plan is decentralized and strong, not at all like different access control plans intended for clouds which are concentrated. The correspondence, calculation, and capacity overheads are similar to brought together methodologies.
Authors and Affiliations
Bande Nagendra Babu| M.Tech (CSE), Gudlavalleru Engineering College, A.P., India, Avinash Potluri| Assistant Professor, Dept. of Computer Science & Engineering, Gudlavalleru Engineering College, A.P, India
Implementing Efficient Search Results and Navigation in website
Designing structured website and organizing search results in website is Challenging task. For this we propose mathematical programming model to improve user navigation as well as novel search interface that enables...
A Categorized Multiuser Data Share Environment In A Mobile Cloud Computing Model
With a specific end goal to give protected and secure operation, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a changed three-layer structure is proposed in...
A Data De-duplication Procedure To Protect The Data Security
Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidential...
FPGA Implementation of Floating Point Reciprocator Using Binomial Expansion Method
Floating-point support has become a mandatory feature of new micro processors due to the prevalence of business, technical, and recreational applications that use these operations. In these operations Floating-point...
Novel Protocol for Efficient And Secure Communication In DWSN
Rising wireless sensor system is a mix of High sensors and Low sensors which is sent in various sort of utilizations like military, patient observing and backwoods checking. In this sensor system sensors are moved on...