Distributed Access Control With Unknown Validation Of Information Stored In Clouds
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
We propose another decentralized access control plan for secure information storage in clouds that backings anonymous validation. In the proposed plan, the cloud checks the arrangement's legitimacy without knowing the client's identity before storing information. Our plan likewise has the included element of access control in which just legitimate clients have the capacity to decrypt the stored data. The plan counteracts replay attacks and backings creation, change, and perusing information stored in the cloud. We likewise address client repudiation. Also, our verification and access control plan is decentralized and strong, not at all like different access control plans intended for clouds which are concentrated. The correspondence, calculation, and capacity overheads are similar to brought together methodologies.
Authors and Affiliations
Bande Nagendra Babu| M.Tech (CSE), Gudlavalleru Engineering College, A.P., India, Avinash Potluri| Assistant Professor, Dept. of Computer Science & Engineering, Gudlavalleru Engineering College, A.P, India
A Novel Image Annotation Method Using Tag Ranking System
Number of mechanized images are growing which are open in online media for picture matching and recuperation picture clarification applications are having influence. Yet existing strategies like substance based pictu...
Privacy and security have emerged as an important research issue in mobile Networks wireless communication, Mobile device based data scattering applications that use these abilities. This paper proposes TurfCast, a n...
Modeling and Simulation Of Transformer-less Grid Connected Photovoltaic System With Artificial Neural Network Based Power Converter
This paper describes a novel transformer less grid connected ANN based power converter with negative grounding for a photovoltaic generation system. The negative terminal of the solar cell array can be directly conne...
Seculation Routing With Fortification Wireless Networks
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authenticatio...
A bug report gives data that could help in settling a bug, with the general point of enhancing the product quality. A substantial number of bug reports could be opened amid the advancement life-cycle of a product pro...