Data Authentication and Security provider

Published on January 2017 | Categories: Documents | Downloads: 56 | Comments: 0 | Views: 210
of 4
Download PDF   Embed   Report

Comments

Content

IJRRECS/October 2013/Volume-1/Issue-6/1012-1015

ISSN 2321-5461

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE

DATA AUTHENTICATION AND SECURITY PROVIDER FOR THE ASSURED DELETION OF THE FILE IN CLOUD K.Monika1, G.Balakrishna2
1

M.Tech Student, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering), Ghatkesar, R.R Dist, A.P, India

2

Assistant Professor, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering), Ghatkesar, R.R Dist, A.P, India

ABSTRACT: Here a system is implemented by the advancement of the internet plays a crucial role in its representative analysis oriented aspect relative to the scenario of the services based on the computation of the cloud plays a crucial role in its day life respectively. There are a lot of services provided by the cloud and some of them includes the software, infrastructure and followed by the platform plays a crucial role in a well respective fashion. Here by the above utilization based scenario there is a reduction in the cost oriented strategy followed by the reliable data transfer respectively. There is a huge guarantee for the providing of the data related to the security is a crucial role in its representative analysis where the data outsourcing plays a crucial role in a reliable fashion respectively. Here a new technique is implemented by the task of the FADE plays a crucial role for the well efficient implementation of the system storage system based on the secured overlay strategy of the scenario related to the access of the fine grained phenomena for the accurate assurance of the deletion of the data plays a crucial role in its representation and the analysis point of view respectively. Simulations have been conducted on the present method where there is a lot of analysis takes place in an unknown environments with respect to the large number of the datasets in a well oriented fashion respectively. Here there is an improvement in the system in terms of the performance followed by the outcome of the entire system in a well stipulated fashion respectively. www.ijrrecs.com 1012 | P a g e

IJRRECS/October 2013/Volume-1/Issue-6/1012-1015

ISSN 2321-5461

Keywords: Data authentication, Cloud computation, Security analysis, Privacy aspect, deletion of the data, Control of the access, Data recovery and Storage of the cloud respectively.

1. INTRODUCTION: In a present day life there is a lot of requirement followed by the analysis of the internet and it plays a crucial role in its representation and the analysis point of view in a well oriented fashion respectively [1][4]. Many of the user is getting attracted to this technology due to their well oriented services in terms of the reliable data transmission followed by the secured

respectively [5][6]. Therefore by the above analysis there is a lot of improvement in the system by the above structural aspects respectively. BLOCK DIAGRAM

transfer and also the reduced cost plays a crucial role for the accurate and the more increased access of the system respectively. Many of the companies are completely based on the services of the cloud that is the advancement of the internet due to which there is a complete access of the resources from the cloud in a reduced cost oriented strategy followed by the reliable data transmission in a well efficient manner takes place in the system [2][3]. Data outsourcing plays a crucial role for the storage based scenario of the backup strategy plays a major role for the complete protection of the user stored data in a well acquainted fashion In this paper a method is designed with a well efficient framework where there is an improvement with respect to the accurate outcome of the system in the entire analysis followed by the improvement in the performance in the strategy in a well efficient manner respectively [7][8]. There is a huge challenge for the present method Fig1: shows the block diagram of the present method respectively 2. METHODOLOGY:

where it is supposed to accurately analyze www.ijrrecs.com 1013 | P a g e

IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 the problems of the several previous methods in a well efficient manner followed by the improvement in the performance based strategy in a explicit nature oriented phenomena respectively [9][10]. Here the implementation oriented with the present mechanism is shown in the below figure in terms of the block diagram and is explained in a brief elaborative fashion respectively. Here we finally conclude that the present method is effective and efficient in terms of the performance based strategy followed by the control oriented with the degraded performance methods in of a the well several efficient previous manner

ISSN 2321-5461

previous methods in a well efficient manner and a number of the computations have been applied on the large number of the data set in a well oriented fashion respectively with respect to the different types of the unknown environment based aspect. A comparative analysis is made between the present method o that of the several previous method is shown in the below figure in the form of the graphical representation and explains in a brief elaborative fashion respectively. Here we finally conclude that the present method completely overcome the drawback of the several previous methods in a well explicit manner and improves the performance of the system in a very efficient phenomena respectively. 4. CONCLUSION: In this paper a new technique is implemented with a powerful strategy where there is a lot of analysis takes place in the system in terms of the improvement based scenario in a well oriented fashion with respect to the performance followed by the outcome of the entire system respectively.

respectively. 3. EXPECTED RESULTS:

Fig2: shows the graphical representation of the present method respectively A lot of analysis is mace between the present method to that so the several

Here a system is implemented by the strategy of the FADE plays a crucial role in its representation based on the storage system of the cloud of the applications well 1014 | P a g e

www.ijrrecs.com

IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 oriented with the scenario of the practical strategy respectively. Where there is a huge control of the access followed by the deletion of the assured data related to the files and oriented control of the system of the services based on the storage of the cloud respectively. There is a file

ISSN 2321-5461

[2]G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik. Scalable and Efficient Provable Data Possession. In Proc. Of SecureComm, 2008. [3]J. Bethencourt, A. Sahai, and B. Waters.Ciphertext-Policy Attribute-Based Encryption. In Proc. of IEEE Symp. On Security and Privacy, May 2006. [4]A. Boldyreva, V. Goyal, and V. Kumar. Identity-based Encryption with Efficient Revocation. In Proc. of ACM CCS, 2008. [5] T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty, “Privacy- Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks,” Proc. Fourth Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous ’07), pp. 1-8, Aug. 2007. [6] Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicola´ s, “Balanced Trustworthiness, Safety and Privacy in Vehicle-tovehicle Communications,” IEEE Trans. Vehicular Technology, vol. 59, no. 2, pp. 559-573, Feb. 2010. [7] L. Chen, S.-L. Ng, and G. Wang, “Threshold Anonymous Announcement in VANETs,” IEEE J. Selected Areas in Comm., vol. 29, no. 3, pp. 1-11, Mar. 2011. [8] C. Chen, X. Wang, W. Han, and B. Zang, “A Robust Detection of the Sybil Attack in Urban Vanets,” Proc. IEEE Int’l Conf. Distributed Computing Systems Workshops (ICDCSW ’09), pp. 270-276, June 2009. [9] S. Park, B. Aslam, D. Turgut, and C.C. Zou, “Defense against Sybil Attack in Vehicular Ad Hoc Network Based on Roadside Unit Support,” Proc. 28th IEEE Conf. Military Comm. (MILCOM ’09), pp. 1-7, Oct. 2009. [10] IEEE Vehicular Technology Soc.: 5.9 GHz Dedicated Short Range Comm. (DSRC) - Overview. http://grouper.ieee.org.groups/

association followed by the scenario of the access of the policies related to the files plays a crucial role in its representation and the access is well oriented with the controlled scenario in a structured aspect respectively. Then after there is a

presentation of the scenario of the control oriented with the accessing of the files plays a crucial role in its representation where the file assurance is completely based on the policy oriented scenario in a well stipulated fashion respectively. Here we finally

conclude that the present method is effective and efficient in terms of the performance followed by the outcome of the entire system in a well oriented scenario

respectively. REFERENCES
[1]M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. Katz, A. Kon- winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia A View of Cloud Computing. 53(4):50–58, Apr 2010. Comm. of the ACM,

scc32/dsrc/, 2011.

www.ijrrecs.com

1015 | P a g e

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close