PROJECT TITLE :

Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure - 2017

ABSTRACT:

With the quick growing demands for the large knowledge, we tend to need to manage and store the massive knowledge within the cloud. Since the cloud is not absolutely trusted and it will be accessed by any users, the info within the cloud could face threats. During this paper, we propose a secure authentication protocol for cloud Big Data with a hierarchical attribute authorization structure. Our proposed protocol resorts to the tree-based signature to considerably improve the safety of attribute authorization. To satisfy the massive data requirements, we tend to extend the proposed authentication protocol to support multiple levels within the hierarchical attribute authorization structure. Security analysis shows that our protocol can resist the forgery attack and replay attack. Additionally, our protocol can preserve the entities privacy. Comparing with the previous studies, we have a tendency to will show that our protocol has lower computational and Communication overhead.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry