FORESEEABLE OF IP ADDRESS ALLOCATIONS FOR CLOUD COMPUTING PLATFORMS

  • Unique Paper ID: 149289
  • Volume: 6
  • Issue: 11
  • PageNo: 520-525
  • Abstract:
  • Due to increase of cloud storage in recent years by the consumers there’s a massive popularity computer memory devices in addition as in mobiles by using file syncing and sharing (FSS) services. But tremendous increasing mobile devices have of course raised a replacement challenge for preventing the decoder abuse within the FSS service. During this approach we address the problem by using tracing and revoking traitors by employing a new system model called anomaly detection and that we present a replacement threshold cryptosystem, that executes the partial-order key hierarchy, the same as role hierarchy in Hierarchical RBAC. This can be also called Partially-ordered Hierarchical Encryption (PHE). Our system provides two different security mechanisms which are traitor tracing and revocation to support digital forensics. Our construction is threshold provably secure which may be known by the safety and performance analysis. It consists of distinct characteristics like revoking users, constant-size cipher texts and decryption keys, lower overloads for large-scale systems.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{149289,
        author = {M.Bhuvaneswari and Mr.R.Rengaraj and S.A.Raesa Tanzila and B.Sathya},
        title = {FORESEEABLE OF IP ADDRESS ALLOCATIONS FOR CLOUD COMPUTING PLATFORMS},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {6},
        number = {11},
        pages = {520-525},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=149289},
        abstract = {Due to increase of cloud storage in recent years by the consumers there’s a massive popularity computer memory devices in addition as in mobiles by using file syncing and sharing (FSS) services. But tremendous increasing mobile devices have of course raised a replacement challenge for preventing the decoder abuse within the FSS service. During this approach we address the problem by using tracing and revoking traitors by employing a new system model called anomaly detection and that we present a replacement threshold cryptosystem, that executes the partial-order key hierarchy, the same as role hierarchy in Hierarchical RBAC. This can be also called Partially-ordered Hierarchical Encryption (PHE). Our system provides two different security mechanisms which are traitor tracing and revocation to support digital forensics. Our construction is threshold provably secure which may be known by the safety and performance analysis. It consists of distinct characteristics like revoking users, constant-size cipher texts and decryption keys, lower overloads for large-scale systems.},
        keywords = {Cloud Computing,Anomaly detection},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 6
  • Issue: 11
  • PageNo: 520-525

FORESEEABLE OF IP ADDRESS ALLOCATIONS FOR CLOUD COMPUTING PLATFORMS

Related Articles