Enabling Secure File Sharing On Untrusted Servers Using Mona
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their real identities could be easily revealed to cloud providers and attackers. Unconditional identity privacy may bring upon you the abuse of privacy. For pattern a misbehaved staff can deceive others in the company by sharing false files without being noticeable. Therefore traceability which enables the group manager e.g., a company manager to reveal the real identity of a user is also highly desirable. It is extremely suggested that any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud which is defined as the multiple-owner manner. Compared with the single-owner manner where only the group manager can store and adapt data in the cloud the multiple-owner manner is suppler in practical applications. More concretely each user in the group is able to not only read data, but also modify his/ her part of data in the entire data file shared by the company.
Authors and Affiliations
S. Vijaya Lakshmi, M Jyothi
Smart Antennas Adaptive Beamforming through Statistical Signal Processing Techniques
The smart antenna improves the performance of wireless communication systems by increasing channel capacity and spectrum efficiency, extending range of coverage, steering multiple beams to track several mobiles. Smar...
An Interface of Human and Machine with Eye Blinking
Human’s especially handicapped people it is difficult to operate the system. Here is a paper which is used to interface of system and a people with their eye blinking. Here we can find out the eye blinking of any per...
Usage of Ring Signatures To Develop Homomorphic Authenticators In Oruta To Confirm The Uprightness Of Shared Information
It is rehearsed for clients to impact distributed storage administrations to add to information with others in a gathering as information sharing form into a standard element in most distributed storage offerings inc...
Implementation of Trust Aware Routing Framework With Link Failure Consideration and Recovery
Wireless Sensor Network has now huge scope for research and application development but sensor networks are vulnerable to different attack. Hence security is key issue while using Sensor networks. Identity deceptions...
Efficient Energy Management System Through RTOS
This paper describes efficient energy management system to reduce and manage power consumption in home area. The room easily controllable with an RF remote control of a home device and manage through RTOS. The room h...