Efficient and Secure Data Transactions Using AES in P2p Storage Cloud
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
P2P cloud storage is usually a combination of cloud computing and peer-to-peer computing mechanism, where it can offer and provide huge computing, storage services and at the same time it lowers the economic cost of the real time users. Generally, cloud server and cloud users lye outside the data owners trusted domain. The P2P cloud storage creates new challenges regarding the access control and the data security while the data owner usually stores the sensitive information for sharing them in the trusted domain of cloud storage. However there are no such mechanisms available for access control in P2P storage cloud. Hence we propose a system which produces double encryption namely ABE and PRE based on the user attributes, which provides an efficient, secure and fine-grained data access control for the P2P storage cloud. The performance mechanism shows highly efficient and practical for day to day life and also it reduces computation overheads during user revocation than the other schemes.
Authors and Affiliations
S. I. Shaik Hussain, V. Yuvaraj
Advanced Oxidation Processes and DDT Degradation Kinetics with H 2 O 2 /Sunlight
Advanced Oxidation Processes (AOPs) are a group of oxidation processes carried out to remove harmful persistent organic pollutants (POP) from water, which are otherwise very hard to remove. The last century saw a glut o...
Electrical analogy for the solution of unidirectional heat transfer through star and delta configurations
In the modern era the theory of relativity is the generic approach to resolve the problem of different field. Flux is the flow of energy form the transverse surface due to the difference in the energy potential between...
Design and Manufacturing of Mini CNC Plotter Machine
This paper describes a low cost serial communication based mini CNC Plotter Machine based on open source software and hardware. Mini CNC Plotter Machine is an embedded system that works on the Principle on ‘Computer Num...
Bot Detection using Traffic Monitoring and Traffic Analysis
Botnet is peak extensive spread and occurs normally in today’s cyber attacks, resulting in severe intimidations to our network possessions and group’s properties. Botnets are congregation of negotiated computer (Bots) w...
slugA Research on E-Learning environment through data mining approach–A comparative analysis
Data analysis and data mining techniques are standard as important disciplines that convey ‘refined field knowledge’. In earlier days we were asking our friends or relatives for their view regarding produ...