A COMBINED CLOUD ARCHITECTURE FOR PREVENTION OF DUPLICATION AND ANONYMOUS USER AUTHENTICATION
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally delivers a lot of people new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as data possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine-grained data access control is in demand, and subsequently don't scale Itll. The issue of at the same time accomplishing finegrainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. It accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE). Extensive investigation shows that the proposed approach is highly efficient and secure. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing It also presents several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture.
Authors and Affiliations
S. Sutar*
VIBRATION ANALYSIS IN OVERHUNG PUMP
In the present scenario, Energy demand is increasing day by day. To meet that demand, the production or extraction of crude oil, natural gas and other energy resources is done with the help of various pumps. P...
STABILIZE THE MOVEMENT OF NODES ON ANYCAST ROUTING WITH JAMMING RESPONSIVE IN MOBILE AD-HOC NETWORKS
Anycast is an important way of communication for Mobile Ad hoc Networks (MANETs) in terms of resources, robustness and efficiency for replicated service applications. Most of the anycast routing protocols for MANE...
Comparative Adsorption of an Acid Dye with Different Activation of Fly Ash
Adsorption technology involving use of low cost adsorbent provides an economical and eco-friendly option for treating dye wastewaters studded with different type and concentration of various organic pollutants. Pr...
Android base Gaming Application
Android is a mobile operating system (OS) based on the Linux Kernal that is currently developed by Google.With a user interface based on direct manipulation ,Android is designed primarily for touch screen mobile...
Synthesis and Characterization of Biomaterial Hydroxyapatite
Hydroxyapatite (HA) is successfully used as a bio implant material because it resembles the bone apatite up to a great extent and possesses good biocompatibility. In the present study, HA powder has been synthesiz...