Book Details

Data Sharing in between Group Members & group Users By using key destitution

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Cloud computing promises significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Due to the low maintenance, Cloud Computing provides an efficient solution for data sharing among cloud users. But due to frequent change of membership, the sharing data in an un trusted cloud is challenging. We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We are describing several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. In addition we analyses the security scheme of our scheme with rigorous proofs and demonstrate the efficiency of our scheme in experiment.

References

[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.2010.

[2] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp.136- 149, Jan. 2010.

[3] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

[4] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.

[5] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.

[6] Shucheng Yu, Cong Wang, KuiRen, and Weijing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98, 2006

[8] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

Keywords

Cloud computing, data sharing, privacy-preserving, access control, dynamic groups.

Image
  • Format Volume 4, Issue 2, No 5, 2016
  • Copyright All Rights Reserved ©2016
  • Year of Publication 2016
  • Author A D SIVARAMA KUMAR, CHOWDAM JYOTHI
  • Reference IJCS-136
  • Page No 801-806

Copyright 2024 SK Research Group of Companies. All Rights Reserved.