Data Sharing Management in Transparent Computing

Authors

  • Shashank Bapure Computer Engineering, Dr D.Y.Patil School Of Engineering , Lohegaon ,Pune,India
  • Shubham Mate Computer Engineering, Dr D.Y.Patil School Of Engineering , Lohegaon ,Pune,India
  • Shubham Poman Computer Engineering, Dr D.Y.Patil School Of Engineering , Lohegaon ,Pune,India.
  • Pankaj Patil Computer Engineering, Dr D.Y.Patil School Of Engineering , Lohegaon ,Pune,India.
  • Archana Gaikwad Computer Engineering, Dr D.Y.Patil School Of Engineering , Lohegaon ,Pune,India.

Keywords:

Access control , Transparent computing, Authentication, Computer security Multilevel security, Access control, Privacy

Abstract

The transparent computing is gaining more and more courtesy in recent times. Resources are stored on remote
servers, and delivered on demand to clients in a streaming way. The centralized management at servers can bring convenience
security for user’s information. This approach is greatly useful to protect the user data with different security levels, and
provide multilevel access control and valid identity authentication. The proposed scheme is effective in multilevel data
security, flexible in authorized resource sharing. Scope of Transparent Computing is enormous and wide spread, which can be
used in almost all the information technology domains. By asymmetric group key agreement and group signature, propose an
efficient data auditing scheme for to check the file Integrity while at the same time providing some new features, such as
traceability and countability.

Published

2017-05-25

How to Cite

Shashank Bapure, Shubham Mate, Shubham Poman, Pankaj Patil, & Archana Gaikwad. (2017). Data Sharing Management in Transparent Computing. International Journal of Advance Research in Engineering, Science & Technology, 4(5), 497–508. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1562