Public Key Encryption Using Key Aggregate Cryptosystem
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Data contribution is an imperative functionality in cloud storage. For illustration bloggers can let their friends view a separation of their private pictures. An endeavour may contribution her employee’s contact to a segment of sensitive data. The demanding difficulty is how to efficiently share encrypted data. Of course users can download the encrypted data from the storage, decrypt them then send them to others for sharing but it loses the worth of cloud storage. Users should be capable to hand over the access rights of the sharing data to others so that they can way in these data from the server unswervingly. Though judgment a wellorganized and protected way to divide up biased data in cloud storage is not unimportant.
Authors and Affiliations
M Siri Madhavi, A Sowjanya Deepthi
Design of Low Power SAR-ADC in 0.18μm Mixed-Mode CMOS Process
This paper presents an energy efficient successive-approximation-register (SAR) analog-todigital converter (ADC) for biomedical applications.For low-power applications designer needs to come up with a compromise among...
Efficient Defence System For Avoid Malware Propagation In Mobile Network
We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...
Blind Watermarking Scheme for Un-Compressed Video Using RBF Neural Network
Robust watermarking is one of the major multimedia processing applications which is specifically important for compressed and uncompressed video for copyright protection, content authentication and broadcasting. In t...
Advanced Power Allocation in OFDM Systems
In this project, we propose a power allocation strategy by utilizing the duality gap in OFDM systems for the maximization of the sum of data rates at all subcarriers. In order to achieve the maximum capacity, the prop...
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...