To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)

Abstract

Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized. Query in data storage is carrying out flanked by a receiver and a proxy server. The proxy server can do some functions on the outsourced cipher texts and change them to those for the receiver. As a consequence, the receiver can get the data outsourced by the owner with no the proxy server meaningful the content of the data. Proxy servers can convert encrypted files for the holder to encrypted files for the receiver withoutthe requirement of significant the content of the original files. In exercise, the original files will be separate by the owner for the sake of space competence.

Authors and Affiliations

M. Raghu Chandra, P. Bala Krishna Prasad, G. Guru Kesava Dasu

Keywords

Related Articles

Design Of Ternary Arithmetic Circuits Using QDGFET

This paper presents a novel design of ternary arithmetic circuits like half-adder and multiplier using quantum dot field effect transistors. Due to the change in threshold voltage over the range QDGFETs produce one i...

Generalization Algorithm For Prevent Inference Attacks In Social Network Data

Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customiz...

A Mixture Cloud Approach For Safe Official Deduplications

Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...

A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography

My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...

Securing a Network by Modeling and Containment of Worms Using Preference Scanning

Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...

Download PDF file
  • EP ID EP28317
  • DOI -
  • Views 333
  • Downloads 6

How To Cite

M. Raghu Chandra, P. Bala Krishna Prasad, G. Guru Kesava Dasu (2015). To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS). International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28317