Result Evaluation of Contention Based Attribute Prediction Model in Information Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 124

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Result Evaluation of Contention Based Attribute Prediction Model in Information Security

Neha Mourya, Margi Patel

To make data in incongruous structure uncountable approaches are admonished by investigates. Basically the framework to make data indistinct structure is named as encryption or cryptography. Cryptography or encryption computations act a basic part in data security. Disseminated figuring gives exceptionally versatile and more tried and true stockpiling on untouchable trusted servers. It is the blend of different models like grid preparing, dispersed enlisting, utility figuring, and autonomic figuring et cetera. Its sensible pay-per-use utility model results in a reducing of the cost of sending of the same handling resources locally. The key stress over dispersed registering is data outsourcing to a cloud which is the stockpiling of essential information related to client's structure in pariah servers at appropriated territories. It is legitimate for any class of usages that obliges data to be kept away and spread to various customers. Arrangement a deniable CB ? ABE arrangement with composite solicitation bilinear social affairs for building audit free circulated stockpiling organizations. Composite solicitation bilinear get-togethers have two engaging properties, specifically suspecting and wiping out. We make use of the dropping property for building an anticipated circumstance, on the other hand, Freeman moreover pointed out the basic issue of computational cost with regards to the composite solicitation bilinear social affair.

Keywords: Cryptography System, Distributed Network, Information Security system, Attribute Based Encryption ABE, Contention Based CB-ABE

Edition: Volume 5 Issue 5, May 2016

Pages: 587 - 590

Share this Article

How to Cite this Article?

Neha Mourya, Margi Patel, "Result Evaluation of Contention Based Attribute Prediction Model in Information Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163462, Volume 5 Issue 5, May 2016, 587 - 590

Enter Your Email Address




Similar Articles with Keyword 'Cryptography System'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article

Similar Articles with Keyword 'Distributed Network'

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1729 - 1733

Distributed Coordinated Mobile Sensor Control Target Tracking in Multiple Wireless Sensor Networks

Praveena. R, Vinothkumar.P

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2320 - 2322

Survey on Data Collection Methods for Wireless Sensor Network

Soumya Dath G

Share this Article

Similar Articles with Keyword 'Attribute Based Encryption ABE'

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Downloads: 132

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 336 - 341

Deduplication and Decentralized Access Control in Cloud with Efficient Public Auditing Mechanism

Sohail A. Khan, Dr. Shafi K. Pathan

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'System'

Downloads: 173 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Similar Articles with Keyword 'Distributed'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'Network'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 83

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'Information'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'system'

Downloads: 173 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Similar Articles with Keyword 'Attribute'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Similar Articles with Keyword 'Based'

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'ABE'

Downloads: 71

Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020

Pages: 1137 - 1139

Predicting Diabetes using Gradient Boosting is a Machine Learning Technique

Ali Adam Mohammad

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Similar Articles with Keyword 'Contention'

Downloads: 119

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1227 - 1230

Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

Iramma J. Godi, Santhosh Bandak

Share this Article

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 207 - 211

RADNET Routing Enhancement by Red Algorithm

Sakshi Sharma, Manjot Kaur Sidhu

Share this Article



Top