DATA SHARING WITH FORWARD SECURITY

Gorikapudi Mahesh, B.V. Srinivasulu

Abstract


Distributed computing is perpetual emanate most up to date innovation in IT industry, the scholarly world and business. The reiteration of utilizing a system of remote servers exhibited on the web to store, oversee, and handle information, sensibly than a nearby server or a PC. Distributed computing is the very available, pliable innovation that puts equipment, programming, and virtualized assets. Distributed computing substructure works over the web on interest premise. Primary elements of distributed computing is that on-interest capacities, wide system access, asset sharing, fast flexibility ,measured administration adaptability and offers shared administrations to client on interest premise in the scattered environment. Moreover, clients are uninformed of area where machines which really course and host their information. The motivation of this paper is to propose protected information getting to and sharing plan, for open clouds.


Keywords


Authentication; Data Sharing; Cloud Computing; Forward Security;

References


Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou “Cost-effective authentic and anonymous data sharing withforward

Javier Herranz IIIA, “Identity-Based Ring Signatures fromRSA” Artificial Intelligence Research Institute, CSIC, Spanish National Research Council,Campus UAB s/n, E-08193 Bellaterra, Spain

MihirBellare and Sara K. Miner” A Forward-Secure Digital Signature Scheme” Dept. of Computer Science, &EngineeringUniversity of California at SanDiego, 9500 Gilman Drive La Jolla, CA 92093, USA.

Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, “Security And Privacy-Enhancing Multicloud Architectures” Member, IEEE,Luigi Lo Iacono.

Gene ItkisBoston University Computer Science Dept.111 Cumming ton St.Boston, “Forward security: Adaptive cryptography-time evolution”MA 02215,USAitkis@bu.edu

Y. Wu, Z. Wei, and R. H. Deng.” Attribute-based access to scalable media in cloud-assisted content sharing networks” .IEEE Transactions on Multimedia,15(4):778–788, 2013.

A. Shamir. “Identity-Based Cryptosystems and Signature Schemes”.In CRYPTO 1984, volume 196 of Lecture Notes in Computer Science,pages 47–53.Springer, 1999.

D. S. Wong, K. Fung, J. K. Liu, and V. K. Wei. “On the RS-CodeConstruction of Ring Signature Schemes and a Threshold Settingof RST”. In ICICS,volume 2836 of Lecture Notes in Computer Science,pages 34–46. Springer, 2003. security”. DOI: 10.1109/ TC. 2014.23 15619, IEEE Transactions on Computers. Etc…


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.