A Technique for Resource-strained Devices By Refined Evidence of Retrievability Stratagem of Cloud Storage Services
Journal: International Journal of Engineering Research (IJER) (Vol.5, No. 6)Publication Date: 2016-06-01
Authors : Ujjwala Bandawane; Sandeep Gor;
Page : 524-527
Keywords : Cloud storage; Digital Envelope; Third party auditor; Integrity checking; Security.;
- Survey: A Learning Based Slide Generation from Academic Paper
- Survey Paper on Optimum Selection of Ga Algorithm’s Parameters for Software Test Data Generation
- A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents
- A Survey Paper on Learning Pullback HMM Distance for Recognition of Action
- Survey paper on Sketch Based and Content Based Image Retrieval
Abstract
For data integrity issue,previously, due to similar key among users decreases security.Our system implemented digital envelope which provides two keys ,asymmetric-key used for encryption of symmetric-key while the data is encrypted using symmetric-key and Multikeyword search and used TPA.Experimental outcomes between previous and Proposed security methods demonstrated.
Other Latest Articles
Last modified: 2016-08-08 17:59:25