A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context - 2017


With the growing amount of knowledge, the demand of huge information storage considerably increases. Through the cloud center, knowledge suppliers can conveniently share data stored in the center with others. But, one practically necessary downside in massive data storage is privacy. Throughout the sharing method, data is encrypted to be confidential and anonymous. Such operation will shield privacy from being leaked out. To satisfy the practical conditions, knowledge transmitting with multi receivers is also thought-about. Additional a lot of, this paper proposes the notion of pre-authentication for the primary time, i.e., only users with certain attributes that have already. The pre-authentication mechanism combines the benefits of proxy conditional re-encryption multi-sharing mechanism with the attribute-based mostly authentication technique, thus achieving attributes authentication before re-encryption, and ensuring the protection of the attributes and knowledge. Moreover, this paper finally proves that the system is secure and also the proposed pre-authentication mechanism might significantly enhance the system security level.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective
PROJECT TITLE : R3E Reliable Reactive Routing Enhancement for Wireless Sensor Networks - 2014 ABSTRACT: Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless
PROJECT TITLE : PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks - 2014 ABSTRACT: Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking,
PROJECT TITLE : Multi-Core Embedded Wireless Sensor Networks Architecture and Applications - 2014 ABSTRACT: Technological advancements in the silicon industry, as predicted by Moore's law, have enabled integration of billions
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry