Book Details

SECURED DEEP TUNNELED ARCHITECTURE FOR CREATING PRIVACY AWARE SECURED COMMUNICATION

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

The main aim of the application is to retrieve data even if it is not accessed for a long time. In most of the applications, once the data is saved and if it is not accessed for a certain period of time, there is a chance for loss of the data. This can be avoided in our application. It is user friendly and can be easily used by all the users. It is self-service, secured application. This application has a data base that stores text files of the user along with the mail ID of the person by whom the details of the user can be viewed. This application makes the easiest and fastest way to upload the documents in an encrypted manner. The application has a key feature that the data are stored in an encrypted manner. The mail ID of the person whom the user trusts and wishes to disclose the details of the data has to be given so that, in case, if the application is not logged in for a certain period /time out, a message will be triggered to the corresponding mail Id. Therefore, the person can be able to log in with the credentials and they can view the files which has stored in Database.

References

[1] X. Fei, N. Shah, N. Verba, K.-M. Chao, V. Sanchez-Anguix, J. Lewandowski, et al., "CPS data streams analytics based on machine learning for cloud and fog computing: A survey", Future Gener. Comput. Syst., vol. 90, pp. 435-450, Jan. 2019.
[2] F. Longo, A. Puliafito and O. Rana, "Guest Editors’ introduction to the special issue on fog edge and cloud integration for smart environments", ACM Trans. Internet Technol., vol. 19, pp. 1-4, Apr. 2019.
[3] Y. Wang, A. Bracciali, T. Li, F. Li, X. Cui and M. Zhao, "Randomness invalidates criminal smart contracts", Inf. Sci., vol. 477, pp. 291-301, Mar. 2019.
[4] Y. Wang, M. Zhao, Y. Hu, Y. Gao and X. Cui, "Secure computation protocols under asymmetric scenarios in enterprise information system", Enterprise Inf. Syst., pp. 1-21, Mar. 2019.
[5] L. Zhang, Y. Wang, F. Li, Y. Hu and M. H. Au, "A game-theoretic method based on Q-learning to invalidate criminal smart contracts", Inf. Sci., vol. 498, pp. 144-153, Sep. 2019.
[6] L. Qi, X. Zhang, W. Dou, C. Hu, C. Yang and J. Chen, "A two-stage locality-sensitive hashing-based approach for privacy-preserving mobile service recommendation in cross-platform edge environment", Future Gener. Comput. Syst., vol. 88, pp. 636-643, Nov. 2018.

Keywords

Encryption, Cryptography, Mail Alert, Secured Data.

Image
  • Format Volume 10, Issue 1, No 6, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author V. Yogashri , Dr.T.Velumani
  • Reference IJCS-412
  • Page No 2795-2798

Copyright 2024 SK Research Group of Companies. All Rights Reserved.