際際滷shows by User: vdevam / http://www.slideshare.net/images/logo.gif 際際滷shows by User: vdevam / Fri, 20 Jun 2014 07:31:44 GMT 際際滷Share feed for 際際滷shows by User: vdevam Identity Based Secure Distributed Storage Scheme /slideshow/final-ppt-36107062/36107062 finalppt-140620073144-phpapp02
Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG). (2) For one query, a receiver can only access one file, instead of all files of the owner. (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owners secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model.]]>

Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG). (2) For one query, a receiver can only access one file, instead of all files of the owner. (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owners secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model.]]>
Fri, 20 Jun 2014 07:31:44 GMT /slideshow/final-ppt-36107062/36107062 vdevam@slideshare.net(vdevam) Identity Based Secure Distributed Storage Scheme vdevam Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG). (2) For one query, a receiver can only access one file, instead of all files of the owner. (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owners secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/finalppt-140620073144-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG). (2) For one query, a receiver can only access one file, instead of all files of the owner. (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owners secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model.
Identity Based Secure Distributed Storage Scheme from Venkatesh Devam
]]>
3742 7 https://cdn.slidesharecdn.com/ss_thumbnails/finalppt-140620073144-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Injectionofattacksinmanets /slideshow/injectionofattacksin-mane-ts/33858241 injectionofattacksinmanets-140423115013-phpapp02
Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.]]>

Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.]]>
Wed, 23 Apr 2014 11:50:13 GMT /slideshow/injectionofattacksin-mane-ts/33858241 vdevam@slideshare.net(vdevam) Injectionofattacksinmanets vdevam Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/injectionofattacksinmanets-140423115013-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.
Injectionofattacksinmanets from Venkatesh Devam
]]>
297 2 https://cdn.slidesharecdn.com/ss_thumbnails/injectionofattacksinmanets-140423115013-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-vdevam-48x48.jpg?cb=1637210091 Professional Traits: 揃 2 Years of experience in salesforce configuration and customization (Apex, Visualforce) 揃 3x Certified Salesforce Developer/Administrator/Consultant 揃 Understanding of complete development life cycle from requirement gathering to deployment. Personal Traits: Willingness to learn, team facilitator hard worker. Good problem solving in the crucial situation. Energetic, positive attitude and self-motivated. Enthusiastic, creative and willing to assume increased responsibility. https://cdn.slidesharecdn.com/ss_thumbnails/finalppt-140620073144-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/final-ppt-36107062/36107062 Identity Based Secure ... https://cdn.slidesharecdn.com/ss_thumbnails/injectionofattacksinmanets-140423115013-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/injectionofattacksin-mane-ts/33858241 Injectionofattacksinma...