Provisioning of Data Security for File Transformation on Multi Cloud Storage
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2019, Vol 9, Issue 1
Abstract
In file transformation utilizing proxy re-signatures, once a user in the group is revoked; the data cloud server is able to re-sign the blocks, which were signed by the revoked user, with a resigning key. As a result, the effectiveness of user revocation can be significantly developed; computation and communication resources of existing users can be easily saved. Meantime, the data cloud server, who is not in the same trusted domain with each user, is only able to convert a signature of the revoked user into an existing user on the same block, but it cannot sign arbitrary blocks on side of either the revoked user or an existing user.
Authors and Affiliations
Nandhini M, Madhavi Dr. S
A Survey on Big Data Security and Related Techniques to Improve Security
Upgrade of security and protection in portable server farms is challengeable with proficient security key administration. For promoting and research, huge numbers of the organizations utilize huge information, however mi...
Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection Model
In present, duplicate detection methods need to process ever larger datasets in ever shorter time: It is difficult to maintain the dataset. This project presents progressive duplicate detection algorithm that gradually i...
Review of Data Mining Classification Techniques
A Classification is one the most valuable critical techniques. In huge information Classification procedures is helpful to deal with substantial measure of information. Orders are utilized to foresee straight out class n...
Detection of Polycystic Ovary Syndrome from Ultrasound Images Using SIFT Descriptors
Polycystic Ovary Syndrome (PCOS) is a reproductive metabolic complexity described by the quantity of follicles present in the ovary. Ultrasound imaging of the ovary contains basic data about the size, number of follicles...
Provisioning of Data Security for File Transformation on Multi Cloud Storage
In file transformation utilizing proxy re-signatures, once a user in the group is revoked; the data cloud server is able to re-sign the blocks, which were signed by the revoked user, with a resigning key. As a result, th...