Data Authentication and Security provider
Transcript of Data Authentication and Security provider
-
8/13/2019 Data Authentication and Security provider
1/4
IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT
ELECTRONICS AND COMPUTER SCIENCE
www.ijrrecs.com 1012 | P a g e
DATA AUTHENTICATION AND SECURITY PROVIDER FOR THE
ASSURED DELETION OF THE FILE IN CLOUD
K.Monika1, G.Balakrishna2
1M.Tech Student, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering),
Ghatkesar, R.R Dist, A.P, India
2Assistant Professor, Dept of CSE, Anurag Group of Institutions (formerly CVSR College of Engineering),
Ghatkesar, R.R Dist, A.P, India
ABSTRACT:
Here a system is implemented by the advancement of the internet plays a crucial role in its
representative analysis oriented aspect relative to the scenario of the services based on the
computation of the cloud plays a crucial role in its day life respectively. There are a lot of
services provided by the cloud and some of them includes the software, infrastructure and
followed by the platform plays a crucial role in a well respective fashion. Here by the above
utilization based scenario there is a reduction in the cost oriented strategy followed by the
reliable data transfer respectively. There is a huge guarantee for the providing of the data related
to the security is a crucial role in its representative analysis where the data outsourcing plays a
crucial role in a reliable fashion respectively. Here a new technique is implemented by the task
of the FADE plays a crucial role for the well efficient implementation of the system storage
system based on the secured overlay strategy of the scenario related to the access of the fine
grained phenomena for the accurate assurance of the deletion of the data plays a crucial role in
its representation and the analysis point of view respectively. Simulations have been conducted
on the present method where there is a lot of analysis takes place in an unknown environments
with respect to the large number of the datasets in a well oriented fashion respectively. Here
there is an improvement in the system in terms of the performance followed by the outcome of
the entire system in a well stipulated fashion respectively.
-
8/13/2019 Data Authentication and Security provider
2/4
IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461
www.ijrrecs.com 1013 | P a g e
Keywords: Data authenti cation, Cloud computation, Secur ity analysis, Pri vacy aspect, deletion
of the data, Contr ol of the access, Data r ecovery and Storage of the cloud respectively.
1. INTRODUCTION:
In a present day life there is a lot of
requirement followed by the analysis of the
internet and it plays a crucial role in its
representation and the analysis point of view
in a well oriented fashion respectively
[1][4]. Many of the user is getting attracted
to this technology due to their well oriented
services in terms of the reliable data
transmission followed by the secured
transfer and also the reduced cost plays a
crucial role for the accurate and the more
increased access of the system respectively.
Many of the companies are completely
based on the services of the cloud that is the
advancement of the internet due to which
there is a complete access of the resources
from the cloud in a reduced cost oriented
strategy followed by the reliable data
transmission in a well efficient manner takes
place in the system [2][3]. Data outsourcing
plays a crucial role for the storage based
scenario of the backup strategy plays a
major role for the complete protection of the
user stored data in a well acquainted fashion
respectively [5][6]. Therefore by the above
analysis there is a lot of improvement in the
system by the above structural aspects
respectively.
BLOCK DIAGRAM
Fig1: shows the block diagram of the
present method respectively
2. METHODOLOGY:In this paper a method is designed
with a well efficient framework where there
is an improvement with respect to the
accurate outcome of the system in the entire
analysis followed by the improvement in the
performance in the strategy in a well
efficient manner respectively [7][8]. There is
a huge challenge for the present method
where it is supposed to accurately analyze
-
8/13/2019 Data Authentication and Security provider
3/4
IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461
www.ijrrecs.com 1014 | P a g e
the problems of the several previous
methods in a well efficient manner followed
by the improvement in the performance
based strategy in a explicit nature oriented
phenomena respectively [9][10]. Here the
implementation oriented with the present
mechanism is shown in the below figure in
terms of the block diagram and is explained
in a brief elaborative fashion respectively.
Here we finally conclude that the present
method is effective and efficient in terms of
the performance based strategy followed by
the control oriented with the degraded
performance of the several previous
methods in a well efficient manner
respectively.
3. EXPECTED RESULTS:
Fig2: shows the graphical representation
of the present method respectively
A lot of analysis is mace between the
present method to that so the several
previous methods in a well efficient manner
and a number of the computations have been
applied on the large number of the data set
in a well oriented fashion respectively with
respect to the different types of the unknown
environment based aspect. A comparative
analysis is made between the present method
o that of the several previous method is
shown in the below figure in the form of the
graphical representation and explains in a
brief elaborative fashion respectively. Here
we finally conclude that the present method
completely overcome the drawback of the
several previous methods in a well explicit
manner and improves the performance of the
system in a very efficient phenomena
respectively.
4. CONCLUSION:In this paper a new technique is
implemented with a powerful strategy where
there is a lot of analysis takes place in the
system in terms of the improvement based
scenario in a well oriented fashion with
respect to the performance followed by the
outcome of the entire system respectively.
Here a system is implemented by the
strategy of the FADE plays a crucial role in
its representation based on the storage
system of the cloud of the applications well
-
8/13/2019 Data Authentication and Security provider
4/4
IJRRECS/October 2013/Volume-1/Issue-6/1012-1015 ISSN 2321-5461
www.ijrrecs.com 1015 | P a g e
oriented with the scenario of the practical
strategy respectively. Where there is a huge
control of the access followed by the
deletion of the assured data related to the
files and oriented control of the system of
the services based on the storage of the
cloud respectively. There is a file
association followed by the scenario of the
access of the policies related to the files
plays a crucial role in its representation and
the access is well oriented with the
controlled scenario in a structured aspect
respectively. Then after there is a
presentation of the scenario of the control
oriented with the accessing of the files plays
a crucial role in its representation where the
file assurance is completely based on the
policy oriented scenario in a well stipulated
fashion respectively. Here we finally
conclude that the present method is effective
and efficient in terms of the performance
followed by the outcome of the entire
system in a well oriented scenario
respectively.
REFERENCES
[1]M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. Katz, A.
Kon- winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia A View of Cloud Computing. Comm. of the ACM,
53(4):5058, Apr 2010.
[2]G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik.
Scalable and Efficient Provable Data Possession. In Proc. Of
SecureComm, 2008.
[3]J. Bethencourt, A. Sahai, and B. Waters.Ciphertext-Policy
Attribute-Based Encryption. In Proc. of IEEE Symp. On Security
and Privacy, May 2006.
[4]A. Boldyreva, V. Goyal, and V. Kumar. Identity-based
Encryption with Efficient Revocation. In Proc. of ACM CCS,
2008.
[5] T. Zhou, R.R. Choudhury, P. Ning, and K. Chakrabarty,
Privacy- Preserving Detection of Sybil Attacks in Vehicular Ad
Hoc Networks, Proc. Fourth Ann. Intl Conf. Mobile and
Ubiquitous Systems: Networking and Services (MobiQuitous 07),
pp. 1-8, Aug. 2007.
[6] Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicola s,
Balanced Trustworthiness, Safety and Privacy in Vehicle-to-
vehicle Communications, IEEE Trans. Vehicular Technology,
vol. 59, no. 2, pp. 559-573, Feb. 2010.
[7] L. Chen, S.-L. Ng, and G. Wang, Threshold Anonymous
Announcement in VANETs, IEEE J. Selected Areas in Comm.,
vol. 29, no. 3, pp. 1-11, Mar. 2011.
[8] C. Chen, X. Wang, W. Han, and B. Zang, A Robust Detection
of the Sybil Attack in Urban Vanets, Proc. IEEE Intl Conf.
Distributed Computing Systems Workshops (ICDCSW 09), pp.
270-276, June 2009.
[9] S. Park, B. Aslam, D. Turgut, and C.C. Zou, Defense against
Sybil Attack in Vehicular Ad Hoc Network Based on Roadside
Unit Support, Proc. 28th IEEE Conf. Military Comm. (MILCOM
09), pp. 1-7, Oct. 2009.
[10] IEEE Vehicular Technology Soc.: 5.9 GHz Dedicated Short
Range Comm. (DSRC) - Overview.http:/ /grouper.ieee.org.groups/
scc32/dsrc/, 2011.
http://grouper.ieee.org.groups/http://grouper.ieee.org.groups/