International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-11,Issue-8  ( Aug, 2023 )
Past issues
  1. Volume-11,Issue-7  ( Jul, 2023 )
  2. Volume-11,Issue-6  ( Jun, 2023 )
  3. Volume-11,Issue-5  ( May, 2023 )
  4. Volume-11,Issue-4  ( Apr, 2023 )
  5. Volume-11,Issue-3  ( Mar, 2023 )
  6. Volume-11,Issue-2  ( Feb, 2023 )
  7. Volume-11,Issue-1  ( Jan, 2023 )
  8. Volume-10,Issue-12  ( Dec, 2022 )
  9. Volume-10,Issue-11  ( Nov, 2022 )
  10. Volume-10,Issue-10  ( Oct, 2022 )

Statistics report
Nov. 2023
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 128
Paper Published : 1530
No. of Authors : 3973
  Journal Paper

Paper Title :
Protected Admission Control With Secret Verification For Active Groups In The Cloud

Author :R. S. Geethanjali, J. Janet

Article Citation :R. S. Geethanjali ,J. Janet , (2015 ) " Protected Admission Control With Secret Verification For Active Groups In The Cloud " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 10-16, Volume-3, Issue-6

Abstract : We propose an admission control scheme for active groups in the cloud based on the signature verification of each group. Each group has their own signature to access the cloud. The group signatures and security techniques could be utilized to facilitate any anonymous customer to work together with others. We propose a secure multi-owner information discussing plan for groups in the reasoning. The reasoning confirms the credibility of the series without knowing the user’s identity before saving information. Our plan also has the added feature of accessibility management in which only valid customers are able to decrypt the saved information. The plan stops replay attacks and supports creation, modification, and reading information saved in the reasoning. We also address customer cancellation. Moreover, our verification and accessibility management plan is decentralized and robust, unlike other accessibility management techniques designed for atmosphere which are central. The communication, calculations, and storage space are comparable to central approaches. Meanwhile, the storage space expense, security calculations and cost of our plan are independent with the number of suspended customers. In addition, we evaluate the security of our plan with extensive evidence, and demonstrate the performance of our plan in tests. Index terms: Cloud Computing, Data Storing, Data Sharing, Active Groups, Authentication.

Type : Research paper

Published : Volume-3, Issue-6


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 80
| Published on 2015-05-26
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World