Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) on server. This data is processed by the remote server which will be unknown to the user. Providing security is the main challenge for cloud services. To address this problem, we propose a framework which will keep record of the usage of the data in the cloud. Mainly it is an object-centered approach which helps to enable logging mechanism for the data. We provide the JAR mechanism which helps to create dynamic and travelling objects. These travelling objects will be used for authentication for the access of the data. To provide security, we have introduced auditing mechanisms, data possession for integrity verification and identity based encryption algorithm.
Authors and Affiliations
Rohan M. Bangar , Prof. B. B. Gite
Limitations of Network Security for Enabling Application Access
A Study of Universal Design and Web Accessibility of Websites with High Purpose Using of the Internet
As the Internet has become an essential tool in human life, a need for building accessible web pages is being emphasized. Universal design indicates implementation of products and services that are fair and easy to use,...
Software Defined Networking (SDN): A Revolution in Computer Network
SDN creates a dynamic and flexible network architecture that can change as the business requirements change. The growth of the SDN market and cloud computing are very much connected. As the applications cha...
Fuzzy C Means Clustering Algorithm for High Dimensional Data Using Feature Subset Selection Technique
Feature choice involves characteristic a set of the foremost helpful options that produces compatible results because the original entire set of options. A feature choice rule is also evaluated from each the potency...
Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey
Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can acce...