alexa PRIVACY PRESERVING REMOTE DATA TRANSFER IN WEB SERVICE
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on: https://twitter.com/ijirset_r
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

PRIVACY PRESERVING REMOTE DATA TRANSFER IN WEB SERVICE QOS

R.Deepak1, M.Mahalakshmi1 and S.Chakravarthi2
  1. P.G. Student, Dept. of Computer Science and Engineering, Saveetha University, Chennai, India
  2. Associate Professor, Dept. of Computer Science and Engineering, Saveetha University, Chennai, India
Related article at Pubmed, Scholar Google
 

Abstract

Remote data integrity checking is a crucial technology in web services. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. The goal of the Web Services Activity is to build up a set of technologies in order to direct web services to their complete prospective. Web services are playing excellent role, without web services is not possible to run the www or internet. Day by day the web technologies are improving and it is extended to all the minor or major fields like research, educational, business, etc. Existing protocols can support both features with the help of a third party auditor. This becomes the major disadvantage because third party can misuse our private data. So we develop new mechanism for securing web services, we have to consider five essential areas such as communication level security, communication privacy, zparameter inspection, authentication and authorization. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers and also provides security mechanism described above.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords