Secure File Sharing With Access Grants In Cloud

Shanmukh Durga Prasad, K.V.V.L Madhuri

Abstract


We first formally characterize an idea of shared ownership inside a document get to control demonstrate. We at that point propose two conceivable instantiations of our proposed shared ownership model. Our first arrangement, called Commune, depends on secure document dispersal and intrigue safe secret sharing to guarantee that all access gives in the cloud require the help of a concurred limit of owners. In that capacity, Commune can be utilized in existing mists without changes to the stages. Our second arrangement, named Comrade, influences the blockchain innovation so as to achieve accord on access control choice. In contrast to Commune, Comrade necessitates that the cloud can interpret get to control choices that achieve accord in the blockchain into capacity get to control rules, in this manner requiring minor changes to existing mists. We break down the security of our recommendations and think compare/evaluate their execution through usage using Amazon S3.


References


M. Y. Becker, C. Fournet, and A. D. Gordon, “SecPAL: Design and Semantics of a Decentralized Authorization Language,” in Journal of Computer Security (JCS), 2010, pp. 597–643.

M. Blaze, J. Ioannidis, and A. D. Keromytis, “Trust Management for IPsec,” in ACM Transactions on Data and System Security (TISSEC), 2002.

N. Li, B. N. Gros of, and J. Feigenbaum, “Delegation logic: A Logic-based Approach to Cloud Authorization,” in TISSEC, 2003.

C. Soriente, G. O. Karame, H. Ritzdorf, S. Marinovic, and S. Capkun, “Commune: Shared ownership in an agnostic cloud,” ser. SACMAT ’15, 2015.

“Amazon Simple Storage Service(S3),” http://aws.amazon.com/s3/.

S. Ceri, G. Gottlob, and L. Tanca, “What you always wanted to know about Datalog (and never dared to ask),” in Knowledge and Data Engineering, IEEE Transactions on, 1989.

Y. Gurevich and I. Neeman, “DKAL: Cloud-Knowledge Authorization Language ,” in CSF ’08.

J. DeTreville, “Binder, a Logic-based Security Language,” in Proceedings of IEEE Symposium on Security and Privacy, 2002, pp. 105 – 113.

“The Respect Network “ https://www.respectnetwork.com/.

“WDMyCloud,” http://www.wdc.com/en/products/products.aspx?id=1140.

M. O. Rabin, “Efficient Dispersal of Data for Security, Load Balancing, and Fault Tolerance,” in Journal of the Association for Computing Machinery.

J. K. Resch and J. S. Plank, “AONT-RS: Blending Security and Performance in Dispersed Storage Systems,” in FAST, 2011.

R. L. Rivest, “All-or-Nothing Encryption and the Package Transform,” in International Workshop on Fast Software Encryption (FSE), 1997.

V. Boyko, “On the Security Properties of OAEP as an All-or-nothing Transform,” in Procedings of CRYPTO, 1999, pp. 503–518.

J. Daemen, and V. Rijmen, “AES Proposal :Rijndael,”


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.