Result Evaluation of Contention Based Attribute Prediction Model in Information Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 312

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.9 / 10


     

Result Evaluation of Contention Based Attribute Prediction Model in Information Security

Neha Mourya, Margi Patel


Abstract: To make data in incongruous structure uncountable approaches are admonished by investigates. Basically the framework to make data indistinct structure is named as encryption or cryptography. Cryptography or encryption computations act a basic part in data security. Disseminated figuring gives exceptionally versatile and more tried and true stockpiling on untouchable trusted servers. It is the blend of different models like grid preparing, dispersed enlisting, utility figuring, and autonomic figuring et cetera. Its sensible pay-per-use utility model results in a reducing of the cost of sending of the same handling resources locally. The key stress over dispersed registering is data outsourcing to a cloud which is the stockpiling of essential information related to client's structure in pariah servers at appropriated territories. It is legitimate for any class of usages that obliges data to be kept away and spread to various customers. Arrangement a deniable CB ? ABE arrangement with composite solicitation bilinear social affairs for building audit free circulated stockpiling organizations. Composite solicitation bilinear get-togethers have two engaging properties, specifically suspecting and wiping out. We make use of the dropping property for building an anticipated circumstance, on the other hand, Freeman moreover pointed out the basic issue of computational cost with regards to the composite solicitation bilinear social affair.


Keywords: Cryptography System, Distributed Network, Information Security system, Attribute Based Encryption ABE, Contention Based CB-ABE


Edition: Volume 5 Issue 5, May 2016


Pages: 587 - 590


DOI: https://www.doi.org/10.21275/NOV163462



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Neha Mourya, Margi Patel, "Result Evaluation of Contention Based Attribute Prediction Model in Information Security", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 587-590, https://www.ijsr.net/getabstract.php?paperid=NOV163462, DOI: https://www.doi.org/10.21275/NOV163462

Similar Articles

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 11 Issue 7, July 2022

Pages: 1076 - 1080

Issues in IT & Information Security System Development

Shakila Shams, M. Abdus Sobhan, Farruk Ahmed, Ali Shihab Sabbir

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Downloads: 133

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 336 - 341

Deduplication and Decentralized Access Control in Cloud with Efficient Public Auditing Mechanism

Sohail A. Khan, Dr. Shafi K. Pathan

Share this Article
Top