Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) on server. This data is processed by the remote server which will be unknown to the user. Providing security is the main challenge for cloud services. To address this problem, we propose a framework which will keep record of the usage of the data in the cloud. Mainly it is an object-centered approach which helps to enable logging mechanism for the data. We provide the JAR mechanism which helps to create dynamic and travelling objects. These travelling objects will be used for authentication for the access of the data. To provide security, we have introduced auditing mechanisms, data possession for integrity verification and identity based encryption algorithm.
Authors and Affiliations
Rohan M. Bangar , Prof. B. B. Gite
Implementation of Various Cryptosystem Using Chaos
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...
Service Cost Estimation in Cloud Environment Using a Third Party Web Server: A Comparative Analysis With and Without Using Cloud Computing
This paper maps the idea of software maintenance cost estimation process onto cloud computing service cost. We have many models for effort estimation in maintenance. Here we implement any cost estimation model to...
An Entropy-based Feature in Epileptic Seizure Prediction Algorithm
Abstract : Epilepsy prediction is a vital demand for people suffering from epileptic onset. Prediction of seizure onsets could be very useful for drug-resistant epileptic patients. We propose an epileptic seizure predict...
Integration of PDM and ERP systems within a unified information space of an enterprise
This article focuses on the research on the complex processes of joint integration of PDM and ERP systems. The relevance of introducing an integrated system within a single information space is justified. The main challe...
Off-Line Signature Verification Using Principal ComponentVariances
Abstract: Signature verification system is always the most sought after biometric verification system. Being abehavioral biometric feature which can always be imitated, the researcher faces a challenge in designing...