DATA SHARING MANAGEMENT IN TRANSPARENT COMPUTING
Main Article Content
Abstract
The transparent computing is gaining more and more courtesy in recent times.
Resources are stored on remote servers, and delivered on demand to clients in a streaming
way. The centralized management at servers can bring convenience security for user’s
information. This approach is greatly useful to protect the user data with different security
levels, and provide multilevel access control and valid identity authentication. The proposed
scheme is effective in multilevel data security, flexible in authorized resource sharing. Scope
of Transparent Computing is enormous and wide spread, which can be used in almost all the
information technology domains. By asymmetric group key agreement and group signature,
propose an efficient data auditing scheme for to check the file Integrity while at the same
time providing some new features, such as traceability and countability.