Providing Security and Minimizing Data Management Cost in the Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome this problem implementing new technique named as decartelized information Accountability framework along with dynamic travelling object(JAR) Which enables to track usage of the users data in cloud. To maintain privacy and integrity we using Policy Based File Assurance Deletion Technique that reliably deletes files of revoked file access policies and assuredly delete files to make them unrecoverable to anyone. Eventually Our Technique minimizes computation and communication overhead.
Authors and Affiliations
Winson. M, N. Tulsi Raju, S. Uma Maheswar Rao
Survey on Different Smoke Detection Techniques Using Image Processing
The most significant parts of protective and monitoring systems are the fire detection systems. Fire detection is very important for the safety of the people. The main causes of disasters are the failure in fire dete...
Locating Equivalent Servants over P2P Networks
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation...
Scent Rupture Nodes Using DCD In Wireless Sensor Networks
A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...
Low Power 10 PAM Transmitter Using Mixed Signal Design Approach
The mixed signal design approach for 10- level pulse amplitude modulation (10-PAM) transmitter which transmit 4-bit per symbol. The frequency is reduced thereby the power dissipation is greatly reduced. The data rate...
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...