Main Reference PaperSecure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure, IEEE Transactions on Big Data, May 2017 [Python]
  • A secure and efficient authentication protocol is proposed that utilizes tree-based signature in order to support hierarchical attribute authorization structure and enables multiple levels authorization with privacy. It provides resistant against forgery and replay attack.

Description
  • A secure and efficient authentication protocol is proposed that utilizes tree-based signature in order to support hierarchical attribute authorization structure and enables multiple levels authorization with privacy. It provides resistant against forgery and replay attack.

  • To enable privacy aware multiple levels authorization.

  • To provide resistance against various attacks .

Aim & Objectives
  • To enable privacy aware multiple levels authorization.

  • To provide resistance against various attacks .

  • Efficient revocation scheme is contributed.

Contribution
  • Efficient revocation scheme is contributed.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit