A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create fake user secrets. Given such fake user secrets, outside coercers can only get hold of phony data from a user’s stored cipher text. Once coercers imagine the received secrets are genuine, they will be content and more prominently cloud storage providers will not have exposed any real secrets. Consequently, user isolation is still protected. This concept comes from a special kind of encryption scheme called deniable encryption. Deniable encryption absorb senders and receivers form convincing fake evidence of forged data in cipher texts such that outside coercers are contented.
Authors and Affiliations
P. Aparna| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India, K. Satya Narayana Murthy| Dept. of CSE, Baba Institute Of Technology & Sciences, Bakkannapalem, Madhurawada, Visakhapatnam ,AP, India
The Instinctive Outline towards Online Shortest Path
Processing the most limited way between two given areas in a road network is a critical issue that discovers applications in different guide administrations and business route items. The best in class answers for the...
Design and implementation of Traffic Flow based Street Light Control System with effective utilization of solar energy
Street Light Control System which operates automatically is not only easiest but also the intelligent system. This system can be set to operate in automatic mode, which regulates the streetlight according to detectio...
An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over l...
A SPWM Full Bridge Inverter With Transformerless PV Grid Connected Inverter
Unipolar sinusoidal pulse width modulation (SPWM) full-bridge inverter brings high-frequency common-mode voltage, which restricts its application in transformer less photovoltaic grid-connected inverters. In order to...
An Exploration Approach To Progress The Rank Privacy In Data Collection
A hierarchical clustering strategy is proposed to bolster more pursuit semantics and furthermore to take care of the demand for quick ciphertext seek inside a major information condition. The proposed various hierarc...