Enabling Secure File Sharing On Untrusted Servers Using Mona
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their real identities could be easily revealed to cloud providers and attackers. Unconditional identity privacy may bring upon you the abuse of privacy. For pattern a misbehaved staff can deceive others in the company by sharing false files without being noticeable. Therefore traceability which enables the group manager e.g., a company manager to reveal the real identity of a user is also highly desirable. It is extremely suggested that any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud which is defined as the multiple-owner manner. Compared with the single-owner manner where only the group manager can store and adapt data in the cloud the multiple-owner manner is suppler in practical applications. More concretely each user in the group is able to not only read data, but also modify his/ her part of data in the entire data file shared by the company.
Authors and Affiliations
S. Vijaya Lakshmi, M Jyothi
An Approach to Identify Node Clones in Wireless Sensor Networks
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch...
AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data
An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...
Iris Data Hiding, Encoding By Using Huffman Coding DWT, SVD Scheme Authenticated By Multi SVM
As the technology advances in day to day life, the process of illegal data copies are producing by miscreants with ease. Various techniques are introducing to protect the copy right data from the miscreants. One such...
An Improved Performance of MANET using AODV Protocol for Black Hole Detection
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...
Cloud Computing Used In Mobile Network
As a new mode of network applications, cloud computing is transforming the Internet computing infrastructure. Also the mobile applications and devices are developing rapidly. Cloud computing is anticipated to bring a...