Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) on server. This data is processed by the remote server which will be unknown to the user. Providing security is the main challenge for cloud services. To address this problem, we propose a framework which will keep record of the usage of the data in the cloud. Mainly it is an object-centered approach which helps to enable logging mechanism for the data. We provide the JAR mechanism which helps to create dynamic and travelling objects. These travelling objects will be used for authentication for the access of the data. To provide security, we have introduced auditing mechanisms, data possession for integrity verification and identity based encryption algorithm.

Authors and Affiliations

Rohan M. Bangar , Prof. B. B. Gite

Keywords

Related Articles

A Study of Universal Design and Web Accessibility of Websites with High Purpose Using of the Internet

As the Internet has become an essential tool in human life, a need for building accessible web pages is being emphasized. Universal design indicates implementation of products and services that are fair and easy to use,...

 Software Defined Networking (SDN): A Revolution in Computer  Network

 SDN creates a dynamic and flexible network architecture that can change as the business requirements change. The growth of the SDN market and cloud computing are very much connected. As the  applications cha...

Fuzzy C Means Clustering Algorithm for High Dimensional Data Using Feature Subset Selection Technique

Feature choice involves characteristic a set of the foremost helpful options that produces compatible results because the original entire set of options. A feature choice rule is also evaluated from each the potency...

 Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey

 Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can acce...

Download PDF file
  • EP ID EP94332
  • DOI 10.9790/0661-162120812
  • Views 89
  • Downloads 0

How To Cite

Rohan M. Bangar, Prof. B. B. Gite (2014).  Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 8-13. https://europub.co.uk/articles/-A-94332