International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing

Author :V.Navya, B.Ramaganesh

Article Citation :V.Navya ,B.Ramaganesh , (2015 ) " Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 29-35, Volume-3, Issue-6

Abstract : Balance features three key innovations: incorporated the access multi-faceted resource/reputation management, multi-QoS-oriented source choice, and price-assisted resource/reputation management. The track information we gathered from an online dealing system indicates the significance of multi-faceted popularity and the disadvantages of highest-reputed node choice. Models and trace-driven tests on the real-world World Lab analyze bed display that Balance outperforms current source management and popularity management techniques with regards to QoS, efficiency and efficiency. In such a program, a customer provides an untrusted server, say a reasoning support agency, with a modification key that allows the reasoning to convert any ABE ciphertext satisfied by that user’s features or accessibility plan into a easy ciphertext, and it only happens upon a small computational expense for the customer to restore the plaintext from the modified ciphertext. Protection of an ABE program with contracted decryption guarantees that an attacker (including a harmful cloud) will not be able to understand anything about the secured message; however, it does not assurance the correctness of the modification done by the reasoning. In this document, we consider a new need of ABE with contracted d encryption: verifiability. Informally, verifiability assures that a customer can efficiently examine if the modification is done properly. We give the official design of ABE with verifiable contracted decryption and recommend a tangible plan. We confirm that our new plan is both protected and verifiable, without depending on unique oracles. Lastly, we display an execution of our plan and outcome of efficiency dimensions, which indicates asignificant decrease on processing sources enforced on customers. Keywords: Harmony, Efficiency, Computing, Ciphertext,Encryption.

Type : Research paper

Published : Volume-3, Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2191   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 79
| Published on 2015-06-05
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY