FORESEEABLE OF IP ADDRESS ALLOCATIONS FOR CLOUD COMPUTING PLATFORMS
Author(s):
M.Bhuvaneswari, Mr.R.Rengaraj, S.A.Raesa Tanzila, B.Sathya
Keywords:
Cloud Computing,Anomaly detection
Abstract
Due to increase of cloud storage in recent years by the consumers there’s a massive popularity computer memory devices in addition as in mobiles by using file syncing and sharing (FSS) services. But tremendous increasing mobile devices have of course raised a replacement challenge for preventing the decoder abuse within the FSS service. During this approach we address the problem by using tracing and revoking traitors by employing a new system model called anomaly detection and that we present a replacement threshold cryptosystem, that executes the partial-order key hierarchy, the same as role hierarchy in Hierarchical RBAC. This can be also called Partially-ordered Hierarchical Encryption (PHE). Our system provides two different security mechanisms which are traitor tracing and revocation to support digital forensics. Our construction is threshold provably secure which may be known by the safety and performance analysis. It consists of distinct characteristics like revoking users, constant-size cipher texts and decryption keys, lower overloads for large-scale systems.
Article Details
Unique Paper ID: 149289

Publication Volume & Issue: Volume 6, Issue 11

Page(s): 520 - 525
Article Preview & Download


Share This Article

Go To Issue



Call For Paper

Volume 7 Issue 3

Last Date 25 August 2020

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies