International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-7, Issue-7  ( Jul, 2019 )
Past issues
  1. Volume-7, Issue-6  ( Jun, 2019 )
  2. Volume-7, Issue-5  ( May, 2019 )
  3. Volume-7, Issue-4  ( Apr, 2019 )
  4. Volume-7, Issue-3  ( Mar, 2019 )
  5. Volume-7, Issue-2  ( Feb, 2019 )
  6. Volume-7, Issue-1  ( Jan, 2019 )
  7. Volume-6, Issue-12  ( Dec, 2018 )
  8. Volume-6, Issue-11  ( Nov, 2018 )
  9. Volume-6, Issue-10  ( Oct, 2018 )
  10. Volume-6, Issue-9  ( Sep, 2018 )

Statistics report
Sep. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 78
Paper Published : 1180
No. of Authors : 2963
  Journal Paper

Paper Title
Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing

Abstract
Balance features three key innovations: incorporated the access multi-faceted resource/reputation management, multi-QoS-oriented source choice, and price-assisted resource/reputation management. The track information we gathered from an online dealing system indicates the significance of multi-faceted popularity and the disadvantages of highest-reputed node choice. Models and trace-driven tests on the real-world World Lab analyze bed display that Balance outperforms current source management and popularity management techniques with regards to QoS, efficiency and efficiency. In such a program, a customer provides an untrusted server, say a reasoning support agency, with a modification key that allows the reasoning to convert any ABE ciphertext satisfied by that user’s features or accessibility plan into a easy ciphertext, and it only happens upon a small computational expense for the customer to restore the plaintext from the modified ciphertext. Protection of an ABE program with contracted decryption guarantees that an attacker (including a harmful cloud) will not be able to understand anything about the secured message; however, it does not assurance the correctness of the modification done by the reasoning. In this document, we consider a new need of ABE with contracted d encryption: verifiability. Informally, verifiability assures that a customer can efficiently examine if the modification is done properly. We give the official design of ABE with verifiable contracted decryption and recommend a tangible plan. We confirm that our new plan is both protected and verifiable, without depending on unique oracles. Lastly, we display an execution of our plan and outcome of efficiency dimensions, which indicates asignificant decrease on processing sources enforced on customers. Keywords: Harmony, Efficiency, Computing, Ciphertext,Encryption.


Author - V.Navya, B.Ramaganesh

| PDF |
Viewed - 70
| Published on 2015-06-05
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY