Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing - 2017


To be able to leverage huge knowledge to achieve enhanced strategic insight, method optimization and create informed decision, we want to be an economical access management mechanism for guaranteeing finish-to-finish security of such information asset. Signcryption is one amongst many promising techniques to simultaneously achieve huge data confidentiality and authenticity. But, signcryption suffers from the limitation of not being able to revoke users from a large-scale system efficiently. We put forward, in this paper, the primary identity-based mostly (ID-primarily based) signcryption scheme with economical revocation likewise because the feature to outsource unsigncryption to enable secure big data communications between data collectors and knowledge analytical system(s). Our scheme is intended to attain end-to-finish confidentiality, authentication, non-repudiation, and integrity simultaneously, while providing scalable revocation functionality such that the overhead demanded by the private key generator (PKG) within the key-update section only increases logarithmically primarily based on the cardiality of users. Although in our scheme the majority of the unsigncryption tasks are outsourced to an untrusted cloud server, this approach will not have an effect on the protection of the proposed scheme. We tend to then prove the security of our theme, as well as demonstrating its utility using simulations.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Design, Control, and Validation of a Charge-Sustaining Parallel Hybrid BicycleABSTRACT:Traffic congestion, energy, and environmental concerns are boosting the interest for light electric vehicles. Electrically power-assisted
PROJECT TITLE :Revocable Certificateless Public Key EncryptionABSTRACT:The concept of a certificateless public-key system (CL-PKS) was first introduced by Al-Riyami and Paterson. The CL-PKS not only solves the key escrow problem
PROJECT TITLE :Distribution, Data, Deployment: Software Architecture Convergence in Big Data SystemsABSTRACT:Massive information applications are pushing the limits of software engineering on multiple horizons. Successful solutions
PROJECT TITLE :Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area NetworksABSTRACT:To confirm the safety and privacy of the patient’s health status within the wireless
PROJECT TITLE :Power converters, control, and energy management for distributed generationABSTRACT:Distributed generation (DG) is anticipated to play a important role in the long run to enhance the quality of human life. DG and

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry