Prevention of Sensitive Information by Enhancing Cloud Access Control
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to centralized approaches. To better protect data security, this paper makes the first attempt to formally address and which are centralized. The communication, computation access control scheme is decentralized and robust; unlike other access control schemes designed for clouds the problem of authorized data. Different from traditional existing systems, the differential privileges of users are further considered in duplicate check besides the data itself by encrypting the file with differential privilege keys. Unauthorized users cannot decrypt the cipher text even collude with the SCSP. Security analysis of the definitions specified in the demonstrates that our system is secure in terms proposed security model.
Authors and Affiliations
SwamyMandapaka| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: swamy1209@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Pesticide Toxicity Classification using Data Mining Techniques
Agriculture is the main occupation of our working population in India. The techniques and strategies used in agriculture since ancient times varied with many different civilizations. As time varied, the attitude towar...
Virus Attack Identification And Representation In Sensor Network
Clusters consist of circulated sensors and motor that interact with each other via wireless network. The use of open wireless intermediate and unattended deployment leaves these systems vulnerable to intelligent adve...
Enhanced Path Reconstruction with Security in WSN
Late remote sensor systems are winding up noticeably progressively complex with the developing system scale and the dynamic way of remote interchanges. Numerous estimation and analytic methodologies rely on upon per-...
A Novel Subset Selection Clustering-Based Algorithm for High Dimensional Data
Feature selection, also known as variable selection, attribute selection or variable subset selection, is the process of selecting a subset of relevant features (variables, predictors) for use in model construction....
Urdhva Tiryagbhyam Sutra Multiplier Based 32-Bit MAC Design
The Vedic Multiplier and the Reversible Logic Gates has Designed and actualized in the increase and Accumulate Unit (MAC) and that is appeared in this paper. A Vedic multiplier is composed by utilizing Urdhava Triyag...