Providing Security and Minimizing Data Management Cost in the Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome this problem implementing new technique named as decartelized information Accountability framework along with dynamic travelling object(JAR) Which enables to track usage of the users data in cloud. To maintain privacy and integrity we using Policy Based File Assurance Deletion Technique that reliably deletes files of revoked file access policies and assuredly delete files to make them unrecoverable to anyone. Eventually Our Technique minimizes computation and communication overhead.
Authors and Affiliations
Winson. M, N. Tulsi Raju, S. Uma Maheswar Rao
Smart Micro-Climate Control System A Green House Farming Revolution
The protected cultivation culture for crops plays a direct vital role in improving production and management. To observe the greenhouse environment parameters effectively, it is necessary to design a fully automatic...
A Lightweight Routing Approach for In-Network Aggregation in Wireless Sensor Networks
Wireless sensor networks (WSNs) have sensing, computation and communications capabilities. Energy conservation is a key issue in WSN. Redundant data can be aggregated at intermediate nodes which can reduce the size a...
Data Accelerating In Wireless Sensor Networks Without Prune Delay
In this advance and fast world people do no want to wait much for collecting information.Hence now a days collecting information in a faster way became a challenge for the research. Faster data collection in WSN with...
New architecture and efficient inter device communication for content transferring in human networks
We present B-SUB, an interest-driven information sharing system for HUNETs, which stands for the bloom-filter-based publish/SUBscribe. B-SUB is calculated for small to medium sized networks selfpossessed of dozens of...
Cloud Computing Security With Two-Level Mechanism
The recent success of cloud services and its ever increasing popularity are not unknown to anyone and neither are the security threats which persist in parallel with its growth. Countermeasures have been introduced t...