Enabling Secure File Sharing On Untrusted Servers Using Mona
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their real identities could be easily revealed to cloud providers and attackers. Unconditional identity privacy may bring upon you the abuse of privacy. For pattern a misbehaved staff can deceive others in the company by sharing false files without being noticeable. Therefore traceability which enables the group manager e.g., a company manager to reveal the real identity of a user is also highly desirable. It is extremely suggested that any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud which is defined as the multiple-owner manner. Compared with the single-owner manner where only the group manager can store and adapt data in the cloud the multiple-owner manner is suppler in practical applications. More concretely each user in the group is able to not only read data, but also modify his/ her part of data in the entire data file shared by the company.
Authors and Affiliations
S. Vijaya Lakshmi, M Jyothi
Network illustration Re-Ranking Using Uncertainty aspect Semantic Signatures
Picture re-positioning, as a viable approach to enhance the aftereffects of online picture inquiry has been embraced by ebb and flow business look engines.a question magic word, a pool of pictures are initially recov...
Accurately Computing Aggregates Using Synopsis Diffusion Framework
The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...
Inter Transactional Association Rule Mining using Boolean Matrix
One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal...
A Survey on Spelling Based CAPTCHA
CAPTCHA is one of the widely used techniques for preventing malicious programs from accessing the web resources automatically. In this paper compare spelling based CAPTCHA with other CAPTCHA.The proposed scheme, name...
Biometric Security Techniques For IRIS Recognition System
Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...