Secure Code Based Mostly Information Forwarding System in Cloud Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Cloud Computing may be a technology that treats the resources on the net as a combined entity, a cloud. This project addresses the matter of forwarding information to a different user by storage servers directly beneath the management of the info owner. With this thought, we tend to propose a completely unique proxy re-encryption theme and integrate it with a secure redistributed code to create a secure distributed wares area structure. The coding set up chains indoctrination operations over encrypted messages and forwarding operations over encrypted and encoded messages. It makes the storage system expeditiously meet the wants of knowledge strength, information confidentiality, and information forwarding. Achieving the mixing considerately of a distributed structure is difficult. Our system meets the wants that storage servers severally perform re- coding and key servers severally perform partial coding. The planned system permits additional versatile adjustment between the quantity of storage servers and strength.
Authors and Affiliations
G. Shaik Abdullah
Optimized Link State Routing Protocol Using Detection lgorithm in Manet
A mobile ad hoc network consists of mobile networks which create an underlying architecture for communication without the help of traditional fixed-position routers. Nevertheless, the architecture must maintain communi...
"Randomized Visual Cryptography scheme for color images”
Abstract: In this paper, we propose a new color visual cryptography scheme which is based on modified visualcryptography. Visual Cryptography is based on cryptography where n images are encoded in a way that onlyth...
Improving search time for contentment based image retrieval via, LSH, MTRee, and EMD bounds
Comparison of images requires a distance metric that is sensitive to the spatial location of objects and features. The Earth Mover’s Distance was introduced in Computer Vision to better approach human perceptua...
Experimental study of Web Page Ranking Algorithms
Today’s life is very much influenced by the internet. Everything can be accessed by making a search on the Internet. Web browsers and web search engines are the two major components of web searching. Web browsers are the...
Reversible Watermarking based on Histogram ShiftingModification:A Review
Abstract: When we talk about the data communication or exchange of information from sender to receiver, themajor concern is DATA. This (data) being of high importance, prone to various kinds of attacks. In order to...