Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
Security and privacy protection in clouds are challenging. Efficient search in clouds is also an important concern. A new decentralized access control scheme that supports anonymous authentication for secure data storage is proposed. In this scheme without knowing the user’s identity before storing the data the cloud verifies the authenticity. This scheme also helps in creation, modification and reading data stored in cloud and also prevents replay attacks.
Opportunities and Challenges for Use and Integration of Information Communication Technology in Management of Public Secondary Schools in Bungoma South District, Kenya Opportunities and Challenges for Use and Integration of Information Communication Technology in Management of Public Secondary Schools in Bungoma South District, Kenya
World over, most sectors have embraced information communication technology (ICT) as the preferred tool of choice for best management practices regarding service delivery in this 21st century. Despite the Kenya governmen...
Double Circuit Transmission Line Fault Distance Location Using Wavelet Transform and WMM Technique
Distance relays used for protection of transmission lines have problems of under-reach, over-reach and mal-operation due to high impedance faults. Further the problem is compounded when distance relays are used for prote...
Diagnosis of Deep Vein Thrombosis (DVT) using Colour Duplex Imaging (CDI) versus D Dimer Test.
Several diagnostic strategies using ultrasound imaging, measurement of D-dimer, and assessment of clinical probability of disease have proved safe in patients with suspected deep-vein thrombosis,. The purpose of this rev...
Homogenization and Parametric Consequence of Warm Deep Drawing Process for 1050A Aluminum Alloy: Validation through FEA
In this present work, a statistical approach based on Taguchi Techniques and finite element analysis were adopted to determine the parametric consequence on the formability of cup using warm deep drawing process. The pro...
Importance of Section 66A in Information Technology Act 2000
Section 66A defines the punishment for sending