Secure Data Sharing using Decoy Technology
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 9
Abstract
Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in cloud storage. Describe new public-key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. Show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. Cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. So provide formal security analysis of our schemes in the standard model and describe other application of our schemes. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. It Decoy technology provide security, Flexibility and confidentiality in data sharing.
Authors and Affiliations
Sonali Karale , Sachin Choudhari
Network Capacity Improvement through Efficient Data Delivery in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks are being increasingly used in wireless communication with many technological enhancements. One of the major issues in such an infrastructure less network is the delivery of the data packets in an...
SIGNIFICANCE OF WEB USAGE MINING IN MACHINE STUDY
The WEB has been provided that a crucial and essential platform for receiving data and circularize data as well as interacting with society on the web. With its astronomical growth over the past decade, the web becomes v...
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...
An Approach to Improve the Performance of Insertion Sort Algorithm
Sorting is a fundamental operation in computer science. Sorting means rearranging data in some order, such as ascending, descending with numerical data or alphabetically with character data. There are many sorting algori...
Algorithms for Mining Association Rules: An Overview
In this paper, we provide the basic concepts about association rule mining and compared existing algorithms for association rule mining techniques. Of course, a single article cannot describe all the algorithms in detail...