Downloads: 124 | Views: 289
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.9 / 10
Result Evaluation of Contention Based Attribute Prediction Model in Information Security
Neha Mourya, Margi Patel
Abstract: To make data in incongruous structure uncountable approaches are admonished by investigates. Basically the framework to make data indistinct structure is named as encryption or cryptography. Cryptography or encryption computations act a basic part in data security. Disseminated figuring gives exceptionally versatile and more tried and true stockpiling on untouchable trusted servers. It is the blend of different models like grid preparing, dispersed enlisting, utility figuring, and autonomic figuring et cetera. Its sensible pay-per-use utility model results in a reducing of the cost of sending of the same handling resources locally. The key stress over dispersed registering is data outsourcing to a cloud which is the stockpiling of essential information related to client's structure in pariah servers at appropriated territories. It is legitimate for any class of usages that obliges data to be kept away and spread to various customers. Arrangement a deniable CB ? ABE arrangement with composite solicitation bilinear social affairs for building audit free circulated stockpiling organizations. Composite solicitation bilinear get-togethers have two engaging properties, specifically suspecting and wiping out. We make use of the dropping property for building an anticipated circumstance, on the other hand, Freeman moreover pointed out the basic issue of computational cost with regards to the composite solicitation bilinear social affair.
Keywords: Cryptography System, Distributed Network, Information Security system, Attribute Based Encryption ABE, Contention Based CB-ABE
Edition: Volume 5 Issue 5, May 2016
Pages: 587 - 590
DOI: https://www.doi.org/10.21275/NOV163462
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2320 - 2322Survey on Data Collection Methods for Wireless Sensor Network
Soumya Dath G
Downloads: 108
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1729 - 1733Distributed Coordinated Mobile Sensor Control Target Tracking in Multiple Wireless Sensor Networks
Praveena. R, Vinothkumar.P
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1612 - 1617Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms
Amol S. Jadhav, Dhanashree Kulkarni