Journal article Open Access
Masarath Begum; Mohammed Abdul Waheed
<?xml version='1.0' encoding='utf-8'?> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#"> <rdf:Description rdf:about="https://zenodo.org/record/5593933"> <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5593933</dct:identifier> <foaf:page rdf:resource="https://zenodo.org/record/5593933"/> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Masarath Begum</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Assistant Professor GNDEC, Bidar, Visvesvaraya Tecnological University Belagavi,Karnataka India</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Mohammed Abdul Waheed</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Associate Professor VTU CPGS, Kalaburgi, Visvesvaraya Tecnological University Belagavi, Karnataka India</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:title>Protecting Data Privacy in Cloud</dct:title> <dct:publisher> <foaf:Agent> <foaf:name>Zenodo</foaf:name> </foaf:Agent> </dct:publisher> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued> <dcat:keyword>Diffie-Hellman key Exchange, LFSR, Correlation</dcat:keyword> <dct:subject> <skos:Concept> <skos:prefLabel>2249-8958</skos:prefLabel> <skos:inScheme> <skos:ConceptScheme> <dct:title>issn</dct:title> </skos:ConceptScheme> </skos:inScheme> </skos:Concept> </dct:subject> <dct:subject> <skos:Concept> <skos:prefLabel>C6096029320 /2020©BEIESP</skos:prefLabel> <skos:inScheme> <skos:ConceptScheme> <dct:title>handle</dct:title> </skos:ConceptScheme> </skos:inScheme> </skos:Concept> </dct:subject> <schema:sponsor> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Blue Eyes Intelligence Engineering & Sciences Publication(BEIESP)</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Publisher</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </schema:sponsor> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-02-29</dct:issued> <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/> <owl:sameAs rdf:resource="https://zenodo.org/record/5593933"/> <adms:identifier> <adms:Identifier> <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5593933</skos:notation> <adms:schemeAgency>url</adms:schemeAgency> </adms:Identifier> </adms:identifier> <dct:relation rdf:resource="http://issn.org/resource/ISSN/2249-8958"/> <owl:sameAs rdf:resource="https://doi.org/10.35940/ijeat.C6096.029320"/> <dct:description><p>Cloud is now widely used for the remote storage of data; it&rsquo;s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. Diffie Hellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value&gt;1), the community&#39;s public key is changed to avoid abuse.</p></dct:description> <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/> <dct:accessRights> <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess"> <rdfs:label>Open Access</rdfs:label> </dct:RightsStatement> </dct:accessRights> <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/> <dcat:distribution> <dcat:Distribution> <dcat:accessURL rdf:resource="https://doi.org/10.35940/ijeat.C6096.029320"/> <dcat:byteSize>723489</dcat:byteSize> <dcat:downloadURL rdf:resource="https://zenodo.org/record/5593933/files/C6096029320.pdf"/> <dcat:mediaType>application/pdf</dcat:mediaType> </dcat:Distribution> </dcat:distribution> </rdf:Description> </rdf:RDF>
Views | 39 |
Downloads | 11 |
Data volume | 8.0 MB |
Unique views | 36 |
Unique downloads | 11 |