Main Reference PaperSecure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure, IEEE Transactions on Big Data, May 2017 [Java]
  • A secure and efficient authentication protocol is proposed that utilizes tree-based signature in order to support hierarchical attribute authorization structure and enables multiple levels authorization with privacy. It provides resistant against forgery and replay attack. 

+ Description
  • A secure and efficient authentication protocol is proposed that utilizes tree-based signature in order to support hierarchical attribute authorization structure and enables multiple levels authorization with privacy. It provides resistant against forgery and replay attack. 

  • To enable privacy aware multiple levels authorization.

  • To provide resistance against various attacks .

+ Aim & Objectives
  • To enable privacy aware multiple levels authorization.

  • To provide resistance against various attacks .

  • Efficient revocation scheme is contributed.

+ Contribution
  • Efficient revocation scheme is contributed.

  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1, & J2EE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40, Hadoop 1.2.1.

  • Netbeans 8.0.1, & J2EE.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.