To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)

Abstract

Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized. Query in data storage is carrying out flanked by a receiver and a proxy server. The proxy server can do some functions on the outsourced cipher texts and change them to those for the receiver. As a consequence, the receiver can get the data outsourced by the owner with no the proxy server meaningful the content of the data. Proxy servers can convert encrypted files for the holder to encrypted files for the receiver withoutthe requirement of significant the content of the original files. In exercise, the original files will be separate by the owner for the sake of space competence.

Authors and Affiliations

M. Raghu Chandra, P. Bala Krishna Prasad, G. Guru Kesava Dasu

Keywords

Related Articles

Design Face track To Achieve An Efficient And Real-Time Tracking Through Detecting The Movement of A Target In WSN’S

The Research in target tracking can be approximately divided into three categories. Treebased schemes, cluster based schemes predictionbased schemes. This paper, mainly recommends Face Track, a framework of activities...

Butterfly Design for RADIX-4K DIF FFT

VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing w...

Enhanced Sparse Coding Technique For Top Image List

Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information...

New Approaches of Ranking Queries in Uncertain Databases

New applications such as sensor data monitoring and mobile device tracking, rise up the issue of uncertain data management. Compared to “certain” data, the data in the uncertain database are not exact points, which, i...

Secure Transmission and Minimizing Communication Over Head In Cooperative Group

A mobile ad-hoc network is a selfconfiguring infrastructure less network of mobile devices connected by wireless. Here the problem is efficiently and securely broadcasting to cooperative groups and trusted key generat...

Download PDF file
  • EP ID EP28317
  • DOI -
  • Views 284
  • Downloads 6

How To Cite

M. Raghu Chandra, P. Bala Krishna Prasad, G. Guru Kesava Dasu (2015). To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS). International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28317