Enviar búsqueda
Cargar
iaetsd Shared authority based privacy preserving protocol
•
0 recomendaciones
•
66 vistas
I
Iaetsd Iaetsd
Seguir
iaetsd
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
Shared aythority ppt design [autosaved]
Shared aythority ppt design [autosaved]
Raj Kumar
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
ieeepondy
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
Recomendados
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
Shared aythority ppt design [autosaved]
Shared aythority ppt design [autosaved]
Raj Kumar
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
ieeepondy
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Pvrtechnologies Nellore
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
I3E Technologies
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
Attribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Migrant Systems
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Papitha Velumani
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
Cloud Security Mechanisms
Cloud Security Mechanisms
Mohammed Sajjad Ali
I42024349
I42024349
IJERA Editor
J018145862
J018145862
IOSR Journals
High efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structures
Iaetsd Iaetsd
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd Iaetsd
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iaetsd Iaetsd
Más contenido relacionado
La actualidad más candente
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Pvrtechnologies Nellore
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
I3E Technologies
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
Attribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Migrant Systems
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Papitha Velumani
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
Cloud Security Mechanisms
Cloud Security Mechanisms
Mohammed Sajjad Ali
I42024349
I42024349
IJERA Editor
J018145862
J018145862
IOSR Journals
La actualidad más candente
(19)
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
Attribute-Based Data Sharing
Attribute-Based Data Sharing
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Cloud Security Mechanisms
Cloud Security Mechanisms
I42024349
I42024349
J018145862
J018145862
Destacado
High efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structures
Iaetsd Iaetsd
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd Iaetsd
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iaetsd Iaetsd
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iaetsd Iaetsd
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Iaetsd Iaetsd
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
iaetsdv Blue eyes a revolution
iaetsdv Blue eyes a revolution
Iaetsd Iaetsd
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
Iaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applications
Iaetsd Iaetsd
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd Iaetsd
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Iaetsd Iaetsd
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd Iaetsd
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iaetsd Iaetsd
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
Iaetsd Iaetsd
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd Iaetsd
Iaetsd io t of bridges
Iaetsd io t of bridges
Iaetsd Iaetsd
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd Iaetsd
Destacado
(19)
High efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structures
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iaetsdv Blue eyes a revolution
iaetsdv Blue eyes a revolution
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applications
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd io t of bridges
Iaetsd io t of bridges
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Similar a iaetsd Shared authority based privacy preserving protocol
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
Paper id 212014106
Paper id 212014106
IJRAT
Security threats in cloud computing
Security threats in cloud computing
Puneet Arora
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
1784 1788
1784 1788
Editor IJARCET
1784 1788
1784 1788
Editor IJARCET
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Editor IJCATR
Similar a iaetsd Shared authority based privacy preserving protocol
(20)
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
Paper id 212014106
Paper id 212014106
Security threats in cloud computing
Security threats in cloud computing
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
1784 1788
1784 1788
1784 1788
1784 1788
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Más de Iaetsd Iaetsd
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
Fabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
Blue brain technology
Blue brain technology
Iaetsd Iaetsd
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
Iaetsd Iaetsd
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
Iaetsd Iaetsd
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
Iaetsd Iaetsd
iaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scada
Iaetsd Iaetsd
Más de Iaetsd Iaetsd
(20)
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Fabrication of dual power bike
Blue brain technology
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scada
Último
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
smsksolar
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
MairaAshraf6
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
anil_gaur
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
nuruddin69
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
JuliansyahHarahap1
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
BhangaleSonal
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
Último
(20)
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
iaetsd Shared authority based privacy preserving protocol
1.
SHARED AUTHORITY BASED
PRIVACY PRESERVING PROTOCOL C. Pragna Bai1 , K. Kishore Kumar2 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. Abstract- Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions generally focus on authentication procedures where a user’s private knowledge cannot be accessed without proper authorization, however neglecting the privacy issue. This could reveal user’s private information regardless of the information access permissions being granted or not. Therefore, we can use SAPA protocol in which shared access authority is achieved by anonymous access request matching mechanism to handle the privacy issue in cloud. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Keywords: Cloud computing, authorization authentication protocol, security, privacy preservation, shared authority. 1.INTRODUCTION Cloud computing is a popular IT architecture in the current trend, which offers exclusive data storage with ondemand services and network access round the clock. This architecture can be witnessed as a service which could be software, infrastructure or a platform available anytime anywhere for the users. Despite being popular and powerful cloud computing faces downfall in areas of privacy and security. Traditional approaches concentrate on the authentication procedures to witness remote access of data on demand. But eventually a user may want to access or share data for better results, which in turn brings security and privacy concerns in cloud storage. In order to overcome this, Shared Authority based Privacy preserving Authentication protocol (SAPA). This protocol is exclusively used for handling the privacy issues in cloud storage. Shared access authority is achieved by anonymous access request matching procedure with four important attributes namely, User privacy, Authentication, Forward Security and Anonymity [1]. User privacy is achieved when any unrelated user cannot wild guess a user’s access interests. Only if they both possess a mutual interest they will be allowed to share by the cloud server. Authentication is achieved when a legal and registered user can access his data and any other data cannot deceive him. Anonymity is achieved when any unrelated entity cannot find out the data transferred and communication state even by interception through open communication channel. Forward security is achieved when any miscreant cannot guess the previous communications with the currently held data of any two sessions. Attribute based access control is used to make sure that the users can access only his data. Thus this protocol is well suited for multi- user collaborative cloud applications since it does not compromise the user’s private information. An example is introduced to identify the main motivation. In the cloud storage based supply chain management, there are various interest groups (e.g., supplier, carrier, and retailer) in the system. Each group owns its users which are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. There into, a supplier purposely may want to access a carrier’s data fields, but it is not sure whether the carrier will allow its access request. If the carrier refuses its request, the supplier’s access desire will be revealed along with nothing obtained towards the desired data fields. Actually, the supplier may not send the access request or withdraw the unaccepted request in advance if it firmly knows that its request will be refused by the carrier. It is unreasonable to thoroughly disclose the supplier’s private information without any privacy considerations. Fig. 1 illustrates three revised cases to address above imperceptible privacy issue. Securing Infrastructure as a Service The IaaS model lets users lease compute, storage, network, and other resources in a virtualized environment. The user doesn’t manage or control the underlying cloud infrastructure but has control over the OS, storage, deployed applications, and possibly certain networking components. Amazon’s Elastic Compute Cloud (EC2) is a good example of IaaS. At the cloud infrastructure level, CSPs can enforce network security with intrusion-detection systems (IDSs), firewalls, antivirus programs, distributed denial-of-service (DDoS) defenses, and so on. Securing Platform as a Service Cloud platforms are built on top of IaaS with system integration and virtualization middleware support. Such platforms let users deploy user-built software applications onto the cloud infrastructure using provider-supported programming languages and software tools II LITERATURE SURVEY Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating systemand language can be used for developing the tool. Once the programmers start building the tool the programmers ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201611
2.
need lot of
external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Implementation: We have implemented our basic approach on Amazon S3 which is a popular cloud based storage service. The content management consists of two tasks. First, the Owner encrypts the data item sets based on the access control policies and uploads the encrypted sets along with some meta-data. Then, authorized users download the encrypted data items sets and meta-data from the Cloud , and decrypt the data item sets using the secrets they have. Now we illustrate the interactions of the Owner with Amazon S3 as the Cloud . In our implementation, we have used the REST API to communicate with Amazon S3. Figure 2 shows the overall involvement of the Owner in the user and content management process when uploading the data item sets to Amazon S3. While the fine-grained access control is enforced by encrypting using the keys generated through the AB-GKM scheme, it is important to limit the access to even the encrypted data item sets in order to minimize the bandwidth utilization. We associate a hash-based message authentication code (HMAC) with each encrypted data item sets such that only the users having valid identity attributes can produce matching HMACs.Initially the Owner creates a bucket , which is a logical container in S3, to store encrypted data item sets as objects . Subsequently, the Owner executes the following steps:1. The Owner generates the symmetric keys using the AB-GKM’s KeyGen algorithm and instantiates an encryption client. Note that the Owner generates a unique symmetric key for each policy configuration. Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds. III. RELATED WORK In [2] ENISA has proposed that “Complexity of risk evaluation” is one of the major privacy challenges in cloud computing. The complexity of the services gives rise to a number of unidentified parameters. Service consumers and providers are careful while providing and consuming services. The real challenge encountered in this scenario is checking the lifecycle of data processing and its conformity with officially authorized frameworks. Some of the following questions are needed to be answered in order to find the risks to privacy: Who are the stakeholders involved?, Where the data is stored?, How data is duplicated?, What are the stakeholder roles and responsibilities?, What are the rules for data processing?, How the service provider will reach the desired level of privacy and security? They have suggested that every user can have an apparent policy as how to the personal data is to be processed and the stakeholders have to specify the needs for cloud that meet the desired level of privacy. ENISA in Europe suggest understanding the shift in balance in terms of accountability and responsibility in key functions and conformity with the laws [2]. In [3] authors suggest that developing and implementing proactive strategies or measures to promote better compliance with the laws of privacy regarding the personal data processing. This can be done through procedures that detect and prevent breaches in systems. Literally, there is no accepted definition for PETs, but in general we can consider technologies with the following qualities are PETs, reduce privacy risks, data held about the users are minimal, allow the users to have control over their information. Therefore, by implementing the PETs the requirements of the proactive measures could be met. And they can protect the privacy over the personal data and prevent from undesired processing. These PETs include tools like anonymisation, encryption, pseudonymisation, transparency enhancing tools. In [4] authors have proposed that “Client Based Privacy Manager” helps in reducing the data leakage and loss of privacy of the sensitive data. Some the major characteristics of the privacy managers are: Data Access: The Manager contains a separate module for accessing personal information by the users in the cloud. This is an auditing procedure that checks accuracy and privacy violations. Obfuscation: This is done by the users on the required fields before being sent to the cloud using a user chosen key that the service providers are not known of. Feedback: This module keeps track of the data being transferred and data usage. Preference Setting: Allows the users to set preferences over their data thereby giving greater control. The major advantage is that it solves automation and end user problems. The disadvantages are, it requires full co-operation of the service provider and sufficient computing resources for obfuscation. In [5] authors have proposed that for Anonymous data sharing between the parties an algorithm is developed to generate ID numbers ranging from 1 to N. And the assignment of these ID’s is anonymous so that the members do not know about it and maximum care is taken to avoid collisions. These procedures are carried out without a trusted third party. Newton’s identities and strum theorem to develop secure sum. Usage of finite polynomials enhances scalability and Markov chain finds the required number of iterations. In [6] authors have proposed that in recent years, the number of mobile users in the society has risen dramatically. The privacy aware authentication scheme provides security and flexibility to the users to make use of various cloud services from various providers using a single private key. A bilinear pairing cryptosystem and nonce generation is used to enhance the security strength of the scheme. In addition to it, it also provides user intractability, mutual authentication, exchange of keys, anonymity and so on. This scheme reduces the memory space usage on the respective cloud service providers. The Smart card Generator serves as the key distributor for providers and mobile clients or users. Also, the scheme does not involve the SCG service in the user authentication procedure. It also reduces the processing time of the authentication process in terms of computation between providers and TTP. Formal Performance analysis tasks are conducted and the scheme is found to be efficient and secure. In [7] authors have suggested that du e to the growing Security needs in the world the mentioned security algorithms have been surveyed and it is found that each has its own pros and cons. But, out of them AES algorithm is found to be efficient. Some of the Advantages are more secure, supports larger key size, faster in terms of hardware and software, 128-bit key size makes it less prone to attacks, suitable for cloud. Some of the ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201612
3.
Disadvantages of other
algorithms are less secure, slow in terms of speed, small and medium key size. In [8] authors have suggested that due to the growth of cloud, security has become a vital part of cloud computing. Malicious activities and vulnerabilities are inevitable. The key purpose is to verify if AES provides better security than other algorithms. By implementing it, it is witnessed that it provides less memory consumption and computation time. Some of the Advantages are high performance, speedy key setup, key agility, less memory, instruction level parallelism, no cryptanalysis attacks have been proved. On comparing with other algorithms, AES eliminates weak keys, which is found is DES. During performance analysis it is found that AES has an advantage over other algorithms in terms of execution time [9]. Also over RC2, RC6 and blowfish with time consumption [10]. IV.PROPOSEDWORK The existing security solutions generally concentrates over the authentication procedures which implies a user’s private information cannot be accessed without proper authorization, while neglecting privacy issue during the data sharing. During the information accessing, different users can be in a mutual relationship which stresses on the importance of knowledge sharing in order to attain better performance. Due to mentioned privacy issue, the user’s private information could be revealed regardless the access permission being granted or not. In a cloud storage based supply chain management, there will be various interest groups in the system. Each group has its own users who are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. For instance, consider two groups G1 and G2, if a user from G1 requests data from the user in G2, and if his request is rejected, the user’s access desire will be revealed along with nothing obtained towards the desired data fields. A user may not send the access request or withdraw the unaccepted request in advance if he firmly knows that his request will be rejected. Therefore, it is unreasonable to thoroughly disclose a user’s private information without any privacy considerations. In order to overcome the privacy issue “shared authority based privacy preserving authentication” protocol (SAPA) can be used for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. Identifies a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. And proposes an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Encryption techniques are used to provide authorized data sharing among multiple users. Shared authority is achieved by anonymous request matching mechanism without compromising the privacy. Also, attribute based access is used to allow only authorized users to request information and proxy reencryption is applied by the cloud server to allow knowledge sharing among the multiple users. In order to witness the SAPA protocol we have developed a simple “e- library management system”. And we have hosted this system on to the Azure cloud and have realized the efficient working of SAPA. IVMETHODOLOGY In this paper, we address the aforementioned privacy issue to propose a shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. The main contributions are as follows. Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Advantages Of Proposed System: The scheme allows users to audit the cloud storage with lightweight communication overloads and computation cost, and the auditing result ensures strong cloud storage correctness and fast data error localization. During cloud data accessing, the user autonomously interacts with the cloud server without external interferences and is assigned with the full and independent authority on its own data fields. Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Fig 1: System Architecture Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201613
4.
the new system
will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. IV. CONCLUSION In this work, we have identified a new privacy challenge during data accessing in the cloud computing to achieve privacy-preserving access authority sharing. Authentication is established to guarantee data confidentiality and data integrity. Data anonymity is achieved since the wrapped values are exchanged during transmission. User privacy is enhanced by anonymous access requests to privately inform the cloud server about the users’ access desires. Forward security is realized by the session identifiers to prevent the session correlation. It indicates that the proposed scheme is possibly applied for enhanced privacy preservation in cloud applications. REFERENCE [1] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In SP 2007: Proceedings of the 28th IEEE Symposium on Security and Privacy, pages 321– 334, 2007. [2] J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G. Neven. Oblivious transfer with hidden access control from attribute-based encryption. In SCN 2012: Proceedings of the 8th International Conference on Security and Cryptography for Networks, pages 559–579, 2012. [3] D. Halevy and A. Shamir. The LSD broadcast encryption scheme. In CRYPTO 2001: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pages 47–60, 2002. [4] J. Li and N. Li. OACerts: Oblivious attribute certificates. IEEE Transactions on Dependable and Secure Computing, 3(4):340–352, 2006. [5] M. Nabeel and E. Bertino. Towards attribute based group key management. In CCS 2011: Proceedings of the 18th ACM conference on Computer and communications security, 2011. [6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving policy based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 99, 2012. [7] OpenID. http://openid.net/ [Last accessed: Oct. 14, 2012]. [8] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO 1991: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages 129–140, 1992. [9] N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy- preserving approach to policy-based content dissemination. In ICDE 2010: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010. [10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In ASIACCS 2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 261–270, 2010. [11] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM 2010: Proceedings of the 29th conference on Information communications, pages 534–542, 2010. [12] C. Collberg and C. Thomborson, ―Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection,‖ IEEE Trans. Software Eng., vol. 28, 2002, pp. 735–746. [13] D. Li, C. Liu, and W. Gan, ―A New Cognitive Model: Cloud Model,‖ Int’l J. Intelligent Systems, Mar. 2009, pp. 357– 375. [14] D. Li and Y. Du, Artificial Intelligence with Uncertainty, Chapman & Hall, 2008. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201614
Descargar ahora