To Implement File based access Control Using Identity-Based Secure distributed Data Storage (IBSDDS)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
Privacy is planned to stop unauthorized users from contact the sensitive data as it is topic to illegal disclose and access after being outsourced. Honesty can stop outsourced data from being put back and customized. Query in data storage is carrying out flanked by a receiver and a proxy server. The proxy server can do some functions on the outsourced cipher texts and change them to those for the receiver. As a consequence, the receiver can get the data outsourced by the owner with no the proxy server meaningful the content of the data. Proxy servers can convert encrypted files for the holder to encrypted files for the receiver withoutthe requirement of significant the content of the original files. In exercise, the original files will be separate by the owner for the sake of space competence.
Authors and Affiliations
M. Raghu Chandra, P. Bala Krishna Prasad, G. Guru Kesava Dasu
Design Of Ternary Arithmetic Circuits Using QDGFET
This paper presents a novel design of ternary arithmetic circuits like half-adder and multiplier using quantum dot field effect transistors. Due to the change in threshold voltage over the range QDGFETs produce one i...
Generalization Algorithm For Prevent Inference Attacks In Social Network Data
Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customiz...
A Mixture Cloud Approach For Safe Official Deduplications
Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
Securing a Network by Modeling and Containment of Worms Using Preference Scanning
Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...