Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) on server. This data is processed by the remote server which will be unknown to the user. Providing security is the main challenge for cloud services. To address this problem, we propose a framework which will keep record of the usage of the data in the cloud. Mainly it is an object-centered approach which helps to enable logging mechanism for the data. We provide the JAR mechanism which helps to create dynamic and travelling objects. These travelling objects will be used for authentication for the access of the data. To provide security, we have introduced auditing mechanisms, data possession for integrity verification and identity based encryption algorithm.
Authors and Affiliations
Rohan M. Bangar , Prof. B. B. Gite
Analysis of Alignment of TEM Image using ECC
Abstract: TEM images are rapidly gaining prominence in various sectors like life sciences, pathology, medical science, semiconductors, forensics, etc. Hence, it is important to analyse the methods which are availab...
Flexible Dynamic Recommender System
A Recommender System now becoming decision maker for the people who lack sufficient personal experience to evaluate the items that are on website. It provides recommendation for specific items such as books, news,...
FEQRP: a Fuzzy based Energy-efficient and QoS Routing Protocol over WSNs
Abstract: In this paper, an energy efficient and QoS routing protocol; named Fuzzy based Energy-efficient and QoS Routing protocol (FEQRP) for wireless sensor networks; is proposed to extend the life time of the network....
Analysis of service-oriented traffic classification with imperfect traffic classification methods
Typically the traffic through the network is heterogeneous and it flows from multiple utilities and applications Considering todays threats in network there is yet not a single solution to solve all the issues be...
Knowledge Management in Software Enterprise
Knowledge management is expected to be integral part any software development and services companies. Knowledge has become an important capital for many organizations in the international competition. So knowle...