Data Authentication and Security provider

download Data Authentication and Security provider

of 4

Transcript of Data Authentication and Security provider

  • 8/13/2019 Data Authentication and Security provider

    1/4

    IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461

    INTERNATIONAL JOURNAL OF REVIEWS ON RECENT

    ELECTRONICS AND COMPUTER SCIENCE

    www.ijrrecs.com 1012 | P a g e

    DATA AUTHENTICATION AND SECURITY PROVIDER FOR THE

    ASSURED DELETION OF THE FILE IN CLOUD

    K.Monika1, G.Balakrishna2

    1M.Tech Student, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering),

    Ghatkesar, R.R Dist, A.P, India

    2Assistant Professor, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering),

    Ghatkesar, R.R Dist, A.P, India

    ABSTRACT:

    Here a system is implemented by the advancement of the internet plays a crucial role in its

    representative analysis oriented aspect relative to the scenario of the services based on the

    computation of the cloud plays a crucial role in its day life respectively. There are a lot of

    services provided by the cloud and some of them includes the software, infrastructure and

    followed by the platform plays a crucial role in a well respective fashion. Here by the above

    utilization based scenario there is a reduction in the cost oriented strategy followed by the

    reliable data transfer respectively. There is a huge guarantee for the providing of the data related

    to the security is a crucial role in its representative analysis where the data outsourcing plays a

    crucial role in a reliable fashion respectively. Here a new technique is implemented by the task

    of the FADE plays a crucial role for the well efficient implementation of the system storage

    system based on the secured overlay strategy of the scenario related to the access of the fine

    grained phenomena for the accurate assurance of the deletion of the data plays a crucial role in

    its representation and the analysis point of view respectively. Simulations have been conducted

    on the present method where there is a lot of analysis takes place in an unknown environments

    with respect to the large number of the datasets in a well oriented fashion respectively. Here

    there is an improvement in the system in terms of the performance followed by the outcome of

    the entire system in a well stipulated fashion respectively.

  • 8/13/2019 Data Authentication and Security provider

    2/4

    IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461

    www.ijrrecs.com 1013 | P a g e

    Keywords: Data authenti cation, Cloud computation, Secur ity analysis, Pri vacy aspect, deletion

    of the data, Contr ol of the access, Data r ecovery and Storage of the cloud respectively.

    1. INTRODUCTION:

    In a present day life there is a lot of

    requirement followed by the analysis of the

    internet and it plays a crucial role in its

    representation and the analysis point of view

    in a well oriented fashion respectively

    [1][4]. Many of the user is getting attracted

    to this technology due to their well oriented

    services in terms of the reliable data

    transmission followed by the secured

    transfer and also the reduced cost plays a

    crucial role for the accurate and the more

    increased access of the system respectively.

    Many of the companies are completely

    based on the services of the cloud that is the

    advancement of the internet due to which

    there is a complete access of the resources

    from the cloud in a reduced cost oriented

    strategy followed by the reliable data

    transmission in a well efficient manner takes

    place in the system [2][3]. Data outsourcing

    plays a crucial role for the storage based

    scenario of the backup strategy plays a

    major role for the complete protection of the

    user stored data in a well acquainted fashion

    respectively [5][6]. Therefore by the above

    analysis there is a lot of improvement in the

    system by the above structural aspects

    respectively.

    BLOCK DIAGRAM

    Fig1: shows the block diagram of the

    present method respectively

    2. METHODOLOGY:In this paper a method is designed

    with a well efficient framework where there

    is an improvement with respect to the

    accurate outcome of the system in the entire

    analysis followed by the improvement in the

    performance in the strategy in a well

    efficient manner respectively [7][8]. There is

    a huge challenge for the present method

    where it is supposed to accurately analyze

  • 8/13/2019 Data Authentication and Security provider

    3/4

    IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461

    www.ijrrecs.com 1014 | P a g e

    the problems of the several previous

    methods in a well efficient manner followed

    by the improvement in the performance

    based strategy in a explicit nature oriented

    phenomena respectively [9][10]. Here the

    implementation oriented with the present

    mechanism is shown in the below figure in

    terms of the block diagram and is explained

    in a brief elaborative fashion respectively.

    Here we finally conclude that the present

    method is effective and efficient in terms of

    the performance based strategy followed by

    the control oriented with the degraded

    performance of the several previous

    methods in a well efficient manner

    respectively.

    3. EXPECTED RESULTS:

    Fig2: shows the graphical representation

    of the present method respectively

    A lot of analysis is mace between the

    present method to that so the several

    previous methods in a well efficient manner

    and a number of the computations have been

    applied on the large number of the data set

    in a well oriented fashion respectively with

    respect to the different types of the unknown

    environment based aspect. A comparative

    analysis is made between the present method

    o that of the several previous method is

    shown in the below figure in the form of the

    graphical representation and explains in a

    brief elaborative fashion respectively. Here

    we finally conclude that the present method

    completely overcome the drawback of the

    several previous methods in a well explicit

    manner and improves the performance of the

    system in a very efficient phenomena

    respectively.

    4. CONCLUSION:In this paper a new technique is

    implemented with a powerful strategy where

    there is a lot of analysis takes place in the

    system in terms of the improvement based

    scenario in a well oriented fashion with

    respect to the performance followed by the

    outcome of the entire system respectively.

    Here a system is implemented by the

    strategy of the FADE plays a crucial role in

    its representation based on the storage

    system of the cloud of the applications well

  • 8/13/2019 Data Authentication and Security provider

    4/4

    IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461

    www.ijrrecs.com 1015 | P a g e

    oriented with the scenario of the practical

    strategy respectively. Where there is a huge

    control of the access followed by the

    deletion of the assured data related to the

    files and oriented control of the system of

    the services based on the storage of the

    cloud respectively. There is a file

    association followed by the scenario of the

    access of the policies related to the files

    plays a crucial role in its representation and

    the access is well oriented with the

    controlled scenario in a structured aspect

    respectively. Then after there is a

    presentation of the scenario of the control

    oriented with the accessing of the files plays

    a crucial role in its representation where the

    file assurance is completely based on the

    policy oriented scenario in a well stipulated

    fashion respectively. Here we finally

    conclude that the present method is effective

    and efficient in terms of the performance

    followed by the outcome of the entire

    system in a well oriented scenario

    respectively.

    REFERENCES

    [1]M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. Katz, A.

    Kon- winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.

    Zaharia A View of Cloud Computing. Comm. of the ACM,

    53(4):5058, Apr 2010.

    [2]G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik.

    Scalable and Efficient Provable Data Possession. In Proc. Of

    SecureComm, 2008.

    [3]J. Bethencourt, A. Sahai, and B. Waters.Ciphertext-Policy

    Attribute-Based Encryption. In Proc. of IEEE Symp. On Security

    and Privacy, May 2006.

    [4]A. Boldyreva, V. Goyal, and V. Kumar. Identity-based

    Encryption with Efficient Revocation. In Proc. of ACM CCS,

    2008.

    [5] T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty,

    Privacy- Preserving Detection of Sybil Attacks in Vehicular Ad

    Hoc Networks, Proc. Fourth Ann. Intl Conf. Mobile and

    Ubiquitous Systems: Networking and Services (MobiQuitous 07),

    pp. 1-8, Aug. 2007.

    [6] Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicola s,

    Balanced Trustworthiness, Safety and Privacy in Vehicle-to-

    vehicle Communications, IEEE Trans. Vehicular Technology,

    vol. 59, no. 2, pp. 559-573, Feb. 2010.

    [7] L. Chen, S.-L. Ng, and G. Wang, Threshold Anonymous

    Announcement in VANETs, IEEE J. Selected Areas in Comm.,

    vol. 29, no. 3, pp. 1-11, Mar. 2011.

    [8] C. Chen, X. Wang, W. Han, and B. Zang, A Robust Detection

    of the Sybil Attack in Urban Vanets, Proc. IEEE Intl Conf.

    Distributed Computing Systems Workshops (ICDCSW 09), pp.

    270-276, June 2009.

    [9] S. Park, B. Aslam, D. Turgut, and C.C. Zou, Defense against

    Sybil Attack in Vehicular Ad Hoc Network Based on Roadside

    Unit Support, Proc. 28th IEEE Conf. Military Comm. (MILCOM

    09), pp. 1-7, Oct. 2009.

    [10] IEEE Vehicular Technology Soc.: 5.9 GHz Dedicated Short

    Range Comm. (DSRC) - Overview.http:/ /grouper.ieee.org.groups/

    scc32/dsrc/, 2011.

    http://grouper.ieee.org.groups/http://grouper.ieee.org.groups/