Main Reference PaperA Pre-Authentication Approach to Proxy Re-encryption in Big Data Context, IEEE Transactions on Big Data, May 2017 [Java].
  • In order to improve the security, the pre-authentication scheme is proposed that enables chosen ciphertext attack CCA-secure data sharing by allowing only the users with verified attributes to access the data and provides protection of private attributes.

+ Description
  • In order to improve the security, the pre-authentication scheme is proposed that enables chosen ciphertext attack CCA-secure data sharing by allowing only the users with verified attributes to access the data and provides protection of private attributes.

  • To improve the security level using attribute based authentication scheme.

  • To protect the private attributes.

+ Aim & Objectives
  • To improve the security level using attribute based authentication scheme.

  • To protect the private attributes.

  • Integrity verification scheme is contributed.

+ Contribution
  • Integrity verification scheme is contributed.

  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1 & J2EE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1 & J2EE.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.