Enhancing Data Storage Integrity in Cloud Environment by mitigating Repudiation using CS-MPNR
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Cloud computing is envisioned as the next generation architecture of IT organisation. It makes the users need of their data to be available wherever they are. Although recent emerging technology Cloud has many striking features, it also has some security dreads. So the users find it difficult to trust the providers who store their data. The vulnerabilities in Cloud storage lead to some loopholes for the attackers to snatch the data and modify or delete it. Data to be secure such as medical reports, industrial files, and other personal and important data should be protected enough from the repudiation problems to maintain Data integrity. To overcome these challenges, a novel new CS-MPNR [Chaining Signature-Multi Party Non Repudiation] protocol is proposed, which is a method that uses Chaining Signature [CS] acting as a link of signature to have a follow up of the chained users and lessens the Disputation. For the need of challenging the providers and also to have fairness during the transaction of data, TTP (Trusted Third Party) is allowed, which reduces the users work of checking the data completeness. Not only it reduces repudiation problem, it also maintains and upholds Data Integrity. Performance evaluation shows that the computational time is reduced with provable security
Authors and Affiliations
Meena S, , Esther Daniel, , Dr. N. A. Vasanthi
64 Bit Domino Logic Adder with 180nm CMOS Technology
Based on 180nm CMOS technology a 64 bit domino logic adder is designed for energy and speed optimization. The adder is designed using 4 bit slice of carry look-ahead adder. Multiple slices are connected in ripple...
Review of issues in automatic labelling of formatted document
The labelling framework, which is proposed to label topic models, essentially consists of a multinomial word distribution, a set of candidate labels, and a context collection. Thus it could be applied to any text m...
Hand Geometry Recognition System Using Feature Extraction
Biometrics traits such as fingerprints, hand geometry, face and voice verification provide a reliable alternative for identity verification and are gaining commercial and high user acceptability rate. Hand geomet...
Restricting mischievous users in anonymizing networks
Anonymizing networks such as knoll tolerate users to admittance Internet services clandestinely by using a progression of routers to bury the client’s IP address from the server. The achievement of such networks,...
Implementation of Radix-4 Multiplier with a Parallel MAC unit using MBE Algorithm
t— A radix-4/-8 multiplier is implemented using modified booth multiplier encoder that demand high speed and low energy operation. Depending on the input pattern, the multiplier operates in the radix-8 mode in 56%...