A COMBINED CLOUD ARCHITECTURE FOR PREVENTION OF DUPLICATION AND ANONYMOUS USER AUTHENTICATION
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally delivers a lot of people new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as data possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine-grained data access control is in demand, and subsequently don't scale Itll. The issue of at the same time accomplishing finegrainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. It accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE). Extensive investigation shows that the proposed approach is highly efficient and secure. Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing It also presents several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture.
Authors and Affiliations
S. Sutar*
Analysis of Centrifugal Pump in Diffuser Vane By Using CFD
pumps, CFD, flow analysis, numerical simulation, radial gab, part load performance. Introduction A centrifugal pump is dynamic machine that uses impeller to increase the pressu They are widely used for liqui...
NATURAL LANGUAGE PROCESSING: A CHAT BOT APPLICATION
This paper presents the design and development of an intelligent chat bot with natural language processing. The paper presents a technology demonstrator to verify a proposed framework required to support such a bot (Spr...
Proposed Technique to Improve VANET’s Vehicle Localization Accuracy in Multipath Environment
Localization (location estimation) of a vehicle in Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services like navigation, vehicle tracking and c...
VIBRATION ANALYSIS OF LEAF SPRING USING FINITE ELEMENT METHOD
All the parts which perform the function of isolating the automobile from the road shocks are collectively called a suspension system. It includes the springing device used and various mounting for same. Suspension syste...
Teaching Writing Skills for Engineering Students
This research paper focuses on the writing skills of the Engineering students of all the branches especially at the time of placements. Writing in English is almost a prerequisite for the job. Now- a-days testing...