Security and Privacy in the Context of the Public Clouds
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials or authorization policies change. Data owners thus incur high communication and computation costs. In order to minimize the overhead at the data owners, while assuring data confidentiality from the cloud, a better approach should be implemented to enforce the secured access control to cloud. We propose an approach, based on two layers of encryption that addresses such requirement. Under this approach, the data owner performs a one layer encryption, and whereas the cloud performs a second layer of encryption on top of the owner encrypted data. We use an effective group key management scheme for encryptions. Our approach provides secrecy of the data and maintains the privacy of the user from the cloud while accessing the cloud.
Authors and Affiliations
Chikkam Naga Venkata Prakash, Sudhir Varma Sagiraju
Issues and Dependencies on Affect Data Models For Assessment of Disorders- A Survey
Analysis of free-form data has always been a challenge. In that, data depicting affects in hidden form and/or in various modes complicates the task of mining to identify and analyze relevant affects from the input. A...
Recent Trends In 4G Over 3G Technology
The objective of this paper is to evaluate recent trends in Fourth generation (4G) mobile services. Given the success of Third generation (3G) mobile communications systems and services, the third generation mobile n...
Adaptive Minimum Bit Error Rate Beamforming Assisted Detection for QAM Pre-FFT OFDM Communication Systems
A novel adaptive beam forming technique is proposed for broadband wireless communication using quadrature amplitude modulation (QAM) signaling based on least symbol error rate (LSER) criterion, the adaptive antenna ar...
Effective Routing Plan For Quality Results On Linked Data Using Keyword Search
Keyword search is a natural world view for seeking connected information sources on the web. We propose to route keywords just to pertinent sources to reduce the high cost of handling keyword search queries over all...
New architecture and efficient inter device communication for content transferring in human networks
We present B-SUB, an interest-driven information sharing system for HUNETs, which stands for the bloom-filter-based publish/SUBscribe. B-SUB is calculated for small to medium sized networks selfpossessed of dozens of...