TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
It greatly attracts attention and interest from both academia and industry due to the profitability, but it also have challenges that must be handled before coming to our real life to the best of our knowledge. Data confidentiality should be guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is the computation outsourcing, it is far beyond enough to just conduct an access control. Secondly, personal information (defined by each user’s attributes set) is at risk because one’s identity is authenticated based on his information for the purpose of access control (or privilege control in this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any client’s personal information. Last but not least, the cloud computing system should be resilient in the case of security breach in which some part of the system is compromised by attackers.
Authors and Affiliations
Ardra K, T Sivakumar
Design of Pseudorandom Pattern Generator for MIHST
The paper describes a system generator which produces Pseudo random sequence with user defined toggling range. The patterns were generated using PRPG; Detection of errors is done using Microprocessor Hardware Self Test...
Design and Analysis of Aircraft Windshield by Using FSI Technique
The windshield or windscreen of an aircraft, car, bus, motorbike or tram is the front window. Windshield is an important assembly of an aircraft and some master features are depended on its quality. The important qualit...
Automobile A.C. By Utilizing Exhaust Gases
Energy efficiency has been a major topic of discussions on natural resources preservation and costs reduction. Based on estimates of energy resources reduction at medium and long terms, internal combustion engines are p...
Transmission of Numeric Data and Voice Using Light Fidelity (LIFI) Technology
LIFI is a field of research which has to cover several miles in each and every phase to prove its efficacy as a potent technology that holds the strength to challenge the wide ranging technology today. Be it the radio s...
slugPerformance Improvement of Health Monitoring System Using Wireless Technologies
The heart rate can be measured by monitoring one's pulse using specialized medical devices such as an electrocardiograph (ECG), portable device e.g. wrist strap watch, or any o...