Efficient User Revocation Technique for Data Forwarding In Untrusted Cloud
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 5
Abstract
We propose a safe information sharing plan for dynamic individuals. Initially, we propose a secured way for key transport with no sheltered correspondence channels, and the customers can securely get their private keys from get-together chief. Second, our arrangement can finish finegrained get the chance to control, any customer in the social affair can use the source in the cloud and denied customers can't get to the cloud again after they are disavowed. Third, we can shield the arrangement from connivance strike, which suggests that revoked customers can't get the primary data report paying little mind to the likelihood that they plot with the untrusted cloud. In our approach, by using polynomial limit, we can fulfil a protected customer denial plot. Finally, our arrangement can achieve fine capability.
Authors and Affiliations
A. Krishna Veni| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, E.G.Dt., AP, India, C. Subash Chandra| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, E.G.Dt., AP, India
Proficient Authentication Mechanism for Mobile and Pervasive Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology...
Finest Informant Filtering of Malicious Traffic in Intrusion Detection System
Traffic volume and diversity will have a major impact on the power of network intrusion detection systems (NIDS) to report malicious activity accurately. Supported the observation that a good deal of traffic is, in f...
Stashing Scope Afore Encoding For Revocable Data Spanking In Encoded Images
Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. The extraction is performed in the reverse order as the...
A Two Layer Secure Data Search with Bilinear Map and AES over Cloud
Multikeyword search over cloud is an interesting research issue in the field of knowledge and data engineering of cloud computing. Various researchers proposed various solutions to upload and process documents over c...
Ann Based Distribution Static Compensator For Power Quality Improvement With Linear Sinusoidal Tracer Control Algorithm
In this paper an ANN based DSTATCOM is proposed for reactive power compensation, harmonics elimination, zero voltage regulation, power factor correction, neutral current compensation and unbalance caused by various l...