Cloud Computing is an important way of communicating and share data over internet. Cloud Computing enables transmission of data over internet and resource utilization at data centers. But during data sharing and resource utilization security plays a vital role since the chances of attacks increases. The data to be stored at data centers needs to be retrieved without any data loss and attack. Hence a multi key based data retrieved with encryption is proposed previously but the techniques require more computational time and hence increase the overall cost. Here in this paper a new and efficient is implemented which uses the concept of Cipher text policy attribute based encryption using elliptic curve based key generation. The implementation is based on the concept of generating a new attribute for each and every data to be send and encrypt the data using the generated attribute and forms a tupple and stored at the storage site. The receiver then authenticates himself and enters the attribute and hence decrypts the data. The proposed methodology implemented here provides efficient retrieval of data over cloud as well as reduces computational time and cost.Index Terms-Cloud computing, DOS, Virtualization, multikeyword retrieval, Attribute based encryption.978-1-4799-8433-6/15/$31.00©2015 IEEE
ABSTRACT"Mobile ad hoc network (MANET)" is an infrastructure less, self controlled wireless network it doesn"t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and "wormhole attack" is also present in those attacks. It is the most powerful attack and very difficult to detect in "wormhole attack" two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of "wormhole attack" is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.