Secure Code Based Mostly Information Forwarding System in Cloud Storage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Cloud Computing may be a technology that treats the resources on the net as a combined entity, a cloud. This project addresses the matter of forwarding information to a different user by storage servers directly beneath the management of the info owner. With this thought, we tend to propose a completely unique proxy re-encryption theme and integrate it with a secure redistributed code to create a secure distributed wares area structure. The coding set up chains indoctrination operations over encrypted messages and forwarding operations over encrypted and encoded messages. It makes the storage system expeditiously meet the wants of knowledge strength, information confidentiality, and information forwarding. Achieving the mixing considerately of a distributed structure is difficult. Our system meets the wants that storage servers severally perform re- coding and key servers severally perform partial coding. The planned system permits additional versatile adjustment between the quantity of storage servers and strength.
Authors and Affiliations
G. Shaik Abdullah
Cloud Computing: Overview & Utility
Abstract: Cloud computing enables the process of storing documents, files photos online instead of using homecomputer, or webmail or a social networking site. If in an organization, it is desired to use an online i...
Medical Image Segmentation Based on Level Set Method
This paper presents a shape-based approach to curve evolution for the segmentation of medical images. Automatic interpretation of medical images is a very difficult problem in computer vision. Several methods...
Embedded Fingerprint Matching Mechanism in HIS for Health Care Service
Abstract: As technologies develops, our needs can be increase and also it can be change.The invention of new medical equipment’s in health care services can help both the patients and the doctors in several ways. I...
Detecting and tracking the hand to create an augmented reality system
To facilitate the access to computer systems, computer scientists choose to design interactive mechanisms which are more adapted than traditionally used devices such as keyboard or mouse. The use of gestures mo...
Cryptanalysis and Security Enhancement of a Khan et al.'sScheme
Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplys...