Enabling Secure File Sharing On Untrusted Servers Using Mona

Abstract

Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their real identities could be easily revealed to cloud providers and attackers. Unconditional identity privacy may bring upon you the abuse of privacy. For pattern a misbehaved staff can deceive others in the company by sharing false files without being noticeable. Therefore traceability which enables the group manager e.g., a company manager to reveal the real identity of a user is also highly desirable. It is extremely suggested that any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud which is defined as the multiple-owner manner. Compared with the single-owner manner where only the group manager can store and adapt data in the cloud the multiple-owner manner is suppler in practical applications. More concretely each user in the group is able to not only read data, but also modify his/ her part of data in the entire data file shared by the company.

Authors and Affiliations

S. Vijaya Lakshmi, M Jyothi

Keywords

Related Articles

Network illustration Re-Ranking Using Uncertainty aspect Semantic Signatures

Picture re-positioning, as a viable approach to enhance the aftereffects of online picture inquiry has been embraced by ebb and flow business look engines.a question magic word, a pool of pictures are initially recov...

Accurately Computing Aggregates Using Synopsis Diffusion Framework

The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...

Inter Transactional Association Rule Mining using Boolean Matrix

One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal...

A Survey on Spelling Based CAPTCHA

CAPTCHA is one of the widely used techniques for preventing malicious programs from accessing the web resources automatically. In this paper compare spelling based CAPTCHA with other CAPTCHA.The proposed scheme, name...

Biometric Security Techniques For IRIS Recognition System

Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...

Download PDF file
  • EP ID EP28088
  • DOI -
  • Views 241
  • Downloads 0

How To Cite

S. Vijaya Lakshmi, M Jyothi (2014). Enabling Secure File Sharing On Untrusted Servers Using Mona. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28088