ENSURING SECURITY PROOF IN CLOUD NETWORK
Journal Title: Indian Journal of Computer Science and Engineering - Year 2015, Vol 6, Issue 4
Abstract
Cloud Computing is developed and used by all enterprise in world to outsource their data. To maintain confidentiality of shared data against entrusted party encryption of data is important. Many scheme is introduced to achieve security of outsource data in cloud .But they fails to achieve data integrity in cloud. Sometimes entrusted cloud service provider modifies or deletes the data without getting permission from owner in cloud. In this paper we investigate the basic problem of data integrity in cloud. Homomorphic Hierarchical Attribute Based Encryption with integrity proof is proposed in this paper to avoid security risk in cloud. Performance of Homomorphic Hierarchical Attribute Based Encryption is compared with key-aggregate cryptosystem (KAC) and Hierarchical Attribute based encryption(HABE) scheme in cloudsim. Based on data integrity, confidentiality and Validity of data best encryption algorithm is chosen in cloud
Authors and Affiliations
R. Manjusha , R. Ramachandran
STUDY OF SDN USING MININET
The traditional architecture of networks has long supported the needs of the data centers. However, with the today’s heavy data usage by users, the need for a shift to virtualizing functions and applying a more modern ap...
WAVELET BASED WATERMARKING ON DIGITAL IMAGE
Safeguarding creative content and intellectual property in a digital form has become increasingly difficult as technologies, such as the internet, broadband availability and mobile access advance. It has grown to be prog...
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
As the problem of urban traffic congestion spreads, there is a pressing need for the introduction of advanced technology and equipment to improve the state-of-the-art of traffic control. Traffic problems nowadays are inc...
Survey on Privacy Preservation in contextaware web services
Context awareness is a property of mobile devices that is defined complementarily to location awareness where as location may determine how certain processes in a device operates, context may be applied more flexibly wit...
Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
This paper is deliberate to provide a model for “Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method ” , It describes the state’s overall requirements regarding the acquisition and i...