FORESEEABLE OF IP ADDRESS ALLOCATIONS FOR CLOUD COMPUTING PLATFORMS
Author(s):
M.Bhuvaneswari, Mr.R.Rengaraj, S.A.Raesa Tanzila, B.Sathya
Keywords:
Cloud Computing,Anomaly detection
Abstract
Due to increase of cloud storage in recent years by the consumers there’s a massive popularity computer memory devices in addition as in mobiles by using file syncing and sharing (FSS) services. But tremendous increasing mobile devices have of course raised a replacement challenge for preventing the decoder abuse within the FSS service. During this approach we address the problem by using tracing and revoking traitors by employing a new system model called anomaly detection and that we present a replacement threshold cryptosystem, that executes the partial-order key hierarchy, the same as role hierarchy in Hierarchical RBAC. This can be also called Partially-ordered Hierarchical Encryption (PHE). Our system provides two different security mechanisms which are traitor tracing and revocation to support digital forensics. Our construction is threshold provably secure which may be known by the safety and performance analysis. It consists of distinct characteristics like revoking users, constant-size cipher texts and decryption keys, lower overloads for large-scale systems.
Article Details
Unique Paper ID: 149289

Publication Volume & Issue: Volume 6, Issue 11

Page(s): 520 - 525
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 11 Issue 1

Last Date for paper submitting for Latest Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on [email protected]

Social Media

Google Verified Reviews