Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4
Abstract
Cloud computing in the domain of distributed systems introduces many challenges in the day-to-day life. One of the main challenges is data security and privacy. Security on cloud data can be enhanced using dual encryption. Different encryption techniques such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Triple DES, Exclusive-OR (XOR), Rivest, Shamir and Adleman (RSA) are used for this purpose. The encryption techniques such as Exclusive-OR (XOR) and Advanced Encryption Standard (AES) can be used together to perform dual encryption on the cloud data. By utilizing cloud to re-sign the blocks that were previously signed by the revoked user on behalf of existing users, efficient user revocation can be performed. Auditing by the Third party auditor ensures the integrity of data stored in the cloud.
Triple Combination Therapy – A 12 Month Case Series
The ultimate goal of periodontal therapy is complete regeneration of the periodontal attachment apparatus. The combination of various regenerative biologic agents has recently attracted the interest of researchers in the...
An Experiment of Cooperative Learning Model to Teach the Students in Writing Scientific Works as Observed from their Logical Thinking Capacity
The aims of this research are: (1) find the differences of the skill in writing scientific works among student groups taught with a cooperative learning model that was divided into several learning methods: Mind Mapping,...
Determining the Efficacy of Combination of Three Ayurvedic Formulations and dhoopana (Medicinal Fumigation) in Prevention of Infections Post Vaginal Delivery with Episiotomy
Abstract- Background -. Sutika paricharya or regimen for the puerperal state, as mentioned in the texts is specifically designed Ayurvedic regimen for restoring the health of the women after the exhausting and laborious...
Study and Analysis of Devnagari Handwritten Character Recognition Techniques
English Character Recognition techniques have been studied extensively in the last few years and its progress and success rate is quite high. But for regional languages these are still emerging and their success rate is...
In vitro Propagation of Aegle marmelos through Nodal Explants
A protocol for micro propagation of bael [Aegle marmelos (L.) Corr.] was developed. The nodal explants of trees were used to initiate cultures. Two cytokinins, viz., 6-benzylaminopurine (BAP) and kinetin (Kn) were used i...