Secured Cloud Information Accountability for Data Sharing Using Identity Based Encryption Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : Cloud Computing provides scalable services which can be used by user on a need basis. These services can be accessed through the internet. User stores important data (mainly, financial and health data) on server. This data is processed by the remote server which will be unknown to the user. Providing security is the main challenge for cloud services. To address this problem, we propose a framework which will keep record of the usage of the data in the cloud. Mainly it is an object-centered approach which helps to enable logging mechanism for the data. We provide the JAR mechanism which helps to create dynamic and travelling objects. These travelling objects will be used for authentication for the access of the data. To provide security, we have introduced auditing mechanisms, data possession for integrity verification and identity based encryption algorithm.
Authors and Affiliations
Rohan M. Bangar , Prof. B. B. Gite
Identifiying the Authorised User by Typing Speed Comparison
Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users....
Automatic Detection of Non-Proliferative Diabetic Retinopathy Using Fundus Images
Abstract: To diagnosis of Diabetic Retinopathy (DR) it is the prime cause of blindness in the working age population of the world. Detection method is proposed to detect dark or red lesions such as microaneurysms a...
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique
Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electro...
Machine Learning techniques for filtering of unwanted messages in Online Social Networks
As of Recent Years, Online Social Networks have transformed into a key bit of step by step life. One key issue in today user wall(s) is to give users the ability to control the messages posted in solitude private s...