TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
It greatly attracts attention and interest from both academia and industry due to the profitability, but it also have challenges that must be handled before coming to our real life to the best of our knowledge. Data confidentiality should be guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is the computation outsourcing, it is far beyond enough to just conduct an access control. Secondly, personal information (defined by each user’s attributes set) is at risk because one’s identity is authenticated based on his information for the purpose of access control (or privilege control in this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any client’s personal information. Last but not least, the cloud computing system should be resilient in the case of security breach in which some part of the system is compromised by attackers.
Authors and Affiliations
Ardra K, T Sivakumar
DDoS Services Attacks In Mobile Ad-hoc Network
In vision of the growing demand for wireless information and data services, it is very important to providing faster and reliable mobile access to users. Today's, not only mobile phones, but also laptops and PDAs are us...
An Efficient Reused VLSI Architecture of FMO/Manchester Encoding using SOLS Technique for DSRC Applications
the dedicated short-extend correspondence (DSRC) is an effective procedure to push the clever transportation framework into our day by day life. The DSRC guidelines for the most part receive FM0 and Manchester codes to...
Analysis of Reversible Data Hiding Efficiency of Images in Image Processing
Now a day data hiding has more attention in image processing field. Reversible data hiding has considerably new approach in image processing. Which allow original image to be completely recovered from marked image effic...
Determination of Swelling Behaviour of Black Cotton Soil with Lime and Red Mud (Bauxite Residue)
Red mud is a byproduct produced in the process of extraction of alumina from bauxite. The process is called Bayers Process. It is insoluble product and is generated after bauxite digestion with sodium hydroxide at eleva...
An Intelligent and Wireless Based Home Area Networks for Metering In Smart Grid
Smart grid is a modernized energy networks that can monitor energy flows intelligently and adjust to changes with respect to energy changes and demand. The traditional electric grid was built earlier and improved upon a...