Data Sharing Management in Transparent Computing
Keywords:
Access control , Transparent computing, Authentication, Computer security Multilevel security, Access control, PrivacyAbstract
The transparent computing is gaining more and more courtesy in recent times. Resources are stored on remote
servers, and delivered on demand to clients in a streaming way. The centralized management at servers can bring convenience
security for user’s information. This approach is greatly useful to protect the user data with different security levels, and
provide multilevel access control and valid identity authentication. The proposed scheme is effective in multilevel data
security, flexible in authorized resource sharing. Scope of Transparent Computing is enormous and wide spread, which can be
used in almost all the information technology domains. By asymmetric group key agreement and group signature, propose an
efficient data auditing scheme for to check the file Integrity while at the same time providing some new features, such as
traceability and countability.