Corpus ID: 155740633

Authenticating a Java Archive files using Identity Based Encryption in the Cloud

  title={Authenticating a Java Archive files using Identity Based Encryption in the Cloud},
  journal={International journal of engineering research and technology},
  • R.Punitha
  • Published 2018
  • Computer Science
  • International journal of engineering research and technology
Cloud computing is one of the most modern research eas due to its ability to decrease costs coupled with compu ting while growing scalability and flexibility for computing s ervices. Cloud computing is one of the greatest increasing technol ogy of the IT trade for business. Since cloud computing share dis tributed resources through the network in the open environme nt, hence it makes security problems very important for us to de velop the cloud computing applications. So that they wanted t o… Expand


Access Control Based Data Security in Cloud Computing
Cloud Computing is mainly about offering services on pay per user basis. It provides Storage-as-aService, where data owner can store their data in the cloud. Data is biggest asset to an organizationExpand
Data Storage Security in Cloud
A method to build a trusted computing environment for Cloud computing system by providing Secure cross platform in to Cloud Computing system and some important security services including authentication, encryption and decryption and compression are provided. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design. Expand
Data Security in Cloud Computing with Elliptic Curve Cryptography
Data security of cloud in cloud computing is explored by implementing digital signature and encryption with elliptic curve cryptography to reduce costs associated with computing while increasing scalability and flexibility for computing services. Expand
Privacy-Preserving Audit and Extraction of Digital Contents
The solution removes the burden of verification from the customer, alleviates both the customer and storage service’s fear of data leakage, and provides a method for independent arbitration of data retention contracts. Expand
Identity-Based Cryptosystems and Signature Schemes
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. Expand
A case for the accountable cloud
This paper proposes that the cloud should be made accountable to both the customer and the provider, and outlines the technical requirements for an accountable cloud and describes several challenges that are not yet met by current accountability techniques. Expand
Fuzzy Identity-Based Encryption
Two constructions of Fuzzy IBE schemes can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity and are both error-tolerant and secure against collusion attacks. Expand
Hierarchical ID-Based Cryptography
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in theExpand
An open framework for foundational proof-carrying code
This work presents the first FPCC framework that systematically supports interoperation between different verification systems, and is fully mechanized in the Coq proof assistant with machine-checkable soundness proof. Expand