Category Archives: JAVA PROJECTS

IF003 – Private Information Retrieval for Secure Distributed Storage Systems

ABSTRACT: In this paper, we examine a private data recovery (PIR) issue for secure disseminated stockpiling frameworks within the sight of a spy. We structure the safe conveyed database and the comparing PIR conspire, which ensure not just client protection (disguising the list of the coveted message) from the databases, yet additionally information security (hiding… Read More »

IF002 – Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

ABSTRACT: Individuals underwrite the extraordinary intensity of distributed computing, however can’t completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee classification, information proprietors redistribute encoded information rather than plaintexts. To impart the encoded records to different clients, ciphertext-arrangement trait based encryption (CP-ABE) can be… Read More »

IF001 – An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images

ABSTRACT: Reversible information covering up in encoded pictures (RDHEI) is a viable strategy to insert information in the scrambled space. A unique picture is scrambled with a mystery key and amid or after its transmission, it is conceivable to install extra data in the encoded picture, without realizing the encryption key or the first substance… Read More »

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

ABSTRACT: Haze registering is an ongoing examination pattern to convey distributed computing administrations to arrange edges. EDCs are sent to diminish the idleness and system blockage by handling information streams and client asks for in close ongoing. EDC arrangement is disseminated in nature and situated between cloud server farms and information sources. Load adjusting is… Read More »

A secure client-side framework for protecting the privacy of health data stored on the cloud

ABSTRACT: In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are rising about security breaches in cloud computing. Cloud providers (CPs) are taking significant measures to maintain the security and privacy… Read More »

A secure client-side framework for protecting the privacy of health data stored on the cloud

ABSTRACT: Distributed computing and informal communities are changing the method for social insurance by giving realtime information partaking in a financially savvy way. In any case, information security issue is one of the primary obstructions to the wide utilization of versatile human services interpersonal organizations (MHSNs), since wellbeing data is viewed as exceedingly touchy. In… Read More »

Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

ABSTRACT: Distributed computing and informal communities are changing the method for social insurance by giving realtime information partaking in a financially savvy way. In any case, information security issue is one of the primary obstructions to the wide utilization of versatile human services interpersonal organizations (MHSNs), since wellbeing data is viewed as exceedingly touchy. In… Read More »

Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

ABSTRACT: Individuals embrace the extraordinary intensity of distributed computing, yet can’t completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee classification, information proprietors redistribute scrambled information rather than plaintexts. To impart the scrambled documents to different clients, ciphertext-strategy trait based encryption (CP-ABE) can be… Read More »

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage

ABSTRACT: At present, there is an impressive increment in the measure of information put away administrations, alongside sensational advancement of systems administration procedures. Away administrations with immense information, the capacity servers might need to diminish the volume of put away information, and the customers might need to screen the respectability of their information with a… Read More »

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

ABSTRACT: Personality based cryptosystems imply that open keys can be straightforwardly gotten from client identifiers, for example, phone numbers, email locations, and social protection number, et cetera. So they can improve key administration methodology of testament based open key foundations and can be utilized to acknowledge verification in blockchain. Directly homomorphic signature plans permit to… Read More »