Showing 85–96 of 468 results

  • Attribute Based Encryption with dynamic membership

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. Attribute-based encryption (ABE) is an advanced encryption technology where the privacy of receivers is protected by a set of attributes. An encryptor can ensure that only the…

  • Attribute-based Access Control for ICN Naming Scheme

    0 out of 5
    5,500

    Attribute-based Access Control for ICN Naming Scheme Abstract? Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IPbased networking architecture. Instead of establishing a connection between the communicating hosts, ICN focuses on the content, i.e. data, transmitted in network. Content copies in ICN can be cached at…

  • Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

    0 out of 5
    4,500

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Abstract? Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

    0 out of 5
    4,500

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks   Abstract? a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. <…

  • Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

    0 out of 5
    5,500

    Attribute-Based Data Sharing Scheme Revisited in Cloud Computing Abstract?Abstract Ciphertext-policy attribute-based encryption (CPABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security…

  • Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    0 out of 5
    4,500

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract– Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure…

  • Product on sale

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

    0 out of 5
    Original price was: ₹7,000.Current price is: ₹5,500.

    Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Abstract-Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication,…

  • Audit-Free Cloud Storage via Deniable Attribute-based Encryption

    0 out of 5
    4,500

    Audit-Free Cloud Storage via Deniable Attribute-based Encryption Abstract? Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in…

  • Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server

    0 out of 5
    4,500

    Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server Abstract?Through virtualization, multiple virtual machines can coexist and operate on one physical machine. When virtual machines < Final Year Projects 2016 > VMs compete for memory, the performances of applications deteriorate, especially those of memory-intensive applications. In this study, we aim to optimize memory…

  • Automatically Enforcing Security SLAs in the Cloud

    0 out of 5
    5,500

    Coral: Automatically Enforcing Security SLAs in the Cloud Abstract?Dealing with the provisioning of Cloud services granted by Security SLAs is a very challenging research topic.The process takes into account both specific implementation constraints of the security components to be deployed and customers security requirements < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ]…

End of content

End of content