Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and encryption computation cost of our method are autonomous with the number of revoked users. In addition we analyze the security of our scheme with rigorous proofs and reveal the competence of our scheme in experiments.Sharing group resource among cloud users is a major problem so cloud computing provides a reasonable and efficient solution. In this paper we propose a secure multi-owner data sharing scheme named Mona for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption methods any cloud user can anonymously share data with others. Due to frequent change of membership sharing data in a multi-owner manner to an untrusted cloud is still a challenging issue.
Authors and Affiliations
P Amaravathi, V. Josephraju, K Challayamma
Heterogeneous Framework for Indian Cybercrime Cases
The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current sc...
Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage
This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...
SOLAR CHIRAL GRAPHENE BATTERY
We review the formulation of graphene’s massless Dirac equation, under the chiral electromagnetism approach, demystifying the material’s unusual chiral, relativistic, effective theory. In Dirac's theory, many authors...
Low Power Adiabatic Complementary Pass Transistor Logic for Sequential Circuit
The VLSI circuit design with extremely low energy dissipation is our approach which uses Adiabatic concept. Adiabatic logic is an attractive low power approach by restricting the currents to flow across devices with...
Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
Many photographic images that are published to particular interests. This makes it more and more copyright piracy of images. In this study will make a tools and methods that can be used to protect the copyright of th...