Efficient User Revocation Technique for Data Forwarding In Untrusted Cloud

Abstract

We propose a safe information sharing plan for dynamic individuals. Initially, we propose a secured way for key transport with no sheltered correspondence channels, and the customers can securely get their private keys from get-together chief. Second, our arrangement can finish finegrained get the chance to control, any customer in the social affair can use the source in the cloud and denied customers can't get to the cloud again after they are disavowed. Third, we can shield the arrangement from connivance strike, which suggests that revoked customers can't get the primary data report paying little mind to the likelihood that they plot with the untrusted cloud. In our approach, by using polynomial limit, we can fulfil a protected customer denial plot. Finally, our arrangement can achieve fine capability.

Authors and Affiliations

A. Krishna Veni| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, E.G.Dt., AP, India, C. Subash Chandra| Dept. of CSE, Kakinada Institute of Engineering & Technology, Korangi, E.G.Dt., AP, India

Keywords

Related Articles

Ergonomic Evaluation of Workstations in an IT Industry

In the Information Technology (IT) industry an individual spends most of time in front of their computers working for more than 7 to 8 hours per day. This continuous sitting in the same postures has been the reason for...

An opportunistic routing algorithm adopts no awareness about the channel statistics and network, but practices a reinforcement learning framework in order to qualify the nodes to familiarize their routing strategies,...

Induction Motor Control With Small DC Link Capacitor Inverter Fed By Three Phase Diode Rectifier

This venture enhances the unwavering quality and power thickness of three stage variable speed drives by controlling presents a little film capacitor inverter based acceptance engine control . A hearty half and half e...

A Study on Effect of Mechanical Properties Of Al-Zro2 Composite by Liquid Routing

In this paper, Al-ZrO2 composites are formed by Vortex method using ZrO2 powder with 1 micron regular diameter as reinforce particles and LM24 as the matrix metal. The melt composites are blended for 13 minutes, then...

Ladderal Structure Of Super Resolution With Support Of Inpainting

Inpainting is the process of reconstructing lost or deteriorated part of images based on the background information. i. e. image Inpainting fills the missing or damaged region in an image utilizing spatial informatio...

Download PDF file
  • EP ID EP16914
  • DOI -
  • Views 292
  • Downloads 7

How To Cite

A. Krishna Veni, C. Subash Chandra (2017). Efficient User Revocation Technique for Data Forwarding In Untrusted Cloud. International Journal of Science Engineering and Advance Technology, 5(5), 400-403. https://europub.co.uk/articles/-A-16914