A novel SSGK to protect the communication process and shared data from unauthorized access

B. Venkateswara Rao, P.Radhika Krupalini

Abstract


A cloud-based big data sharing system uses a storage facility from a cloud specialist co-op to impart data to authentic clients. As opposed to customary arrangements, cloud supplier stores the mutual data in the huge server farms outside the trust area of the data proprietor, which may trigger the issue of data classification. This paper proposes a secret sharing group key management convention (SSGK) to secure the correspondence procedure and shared data from unapproved get to. Not quite the same as the earlier works, a shared key is utilized to encode the common data and a secret sharing plan is utilized to circulate the shared key in SSGK. The broad security and execution investigations demonstrate that our convention profoundly limits the security and protection dangers of sharing data in distributed storage and spares about 12% of extra storage space.


References


P. Zhao, W. Yu, S. Yang, X. Yang, and J. Lin, ‘‘On minimizing energy cost in Internet-scale systems with dynamic data,’’ IEEE Access, vol. 5, pp. 20068–20082, 2017.

D. Wu, G. Zhang, and J. Lu, ‘‘A fuzzy preference tree-based recommender system for personalized business-to-business E-services,’’ IEEE Trans. Fuzzy Syst., vol. 23, no. 1, pp. 29–43, Feb. 2015.

X. Wu, X. Zhu, G.-Q.Wu, and W. Ding, ‘‘Data mining with big data,’’ IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97–107, Jan. 2014.

X. Shi, L. X. Li, L. Yang, Z. Li, and J. Y. Choi, ‘‘Data flow in reverse logistics: An industrial data integration study,’’ Inf. Technol. Manage., vol. 13, no. 4, pp. 217–232, Dec. 2012.

N. Bizanis and F. A. Kuipers, ‘‘SDN and virtualization solutions for the Internet of Things: A survey,’’ IEEE Access, vol. 4, pp. 5591–5606, May 2016.

S. Li, L. Xu, X. Wang, and J. Wang, ‘‘Integration of hybrid wireless networks in cloud services oriented enterprise data systems,’’ Enterprise Inf. Syst., vol. 6, no. 2, pp. 165–187, Nov. 2012.

K.-Y. Teng, S. A. Thekdi, and J. H. Lambert, ‘‘Risk and safety program performance evaluation and business process modeling,’’ IEEE Trans. Syst., Man, Cybern. A, Syst. Humans, vol. 42, no. 6, pp. 1504–1513, Nov. 2012.

Z. Fu, X. Sun, S. Ji, and G. Xie, ‘‘Towards efficient content-aware search over encrypted outsourced data in cloud,’’ in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), Apr. 2016, pp. 1–9.

J. Han, W. Susio, Y. Mu, and J. Hou, ‘‘Improving privacy and security in decentralized ciphertext-policy attribute-based encryption,’’ IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 665–678, Mar. 2015.

D. Zou, Y. Xiang, and G. Min, ‘‘Privacy preserving in cloud computing environment,’’ Secur. Commun.Netw., vol. 9, no. 15, pp. 2752–2753 Oct. 2016.

Y. Tang, P. P. C. Lee, John C. S. Lui, and R. Perlman, ‘‘Secure overlay cloud storage with access control and assured deletion,’’ IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 903–916, Nov./Dec. 2012.

J. Shao, R. Lu, and X. Lin, ‘‘Fine-grained data sharing in cloud computing for mobile devices,’’ in Proc. IEEE Conf. Comput.Commun. (INFOCOM), Apr./May 2015, pp. 2677–2685.

C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, ‘‘Privacypreserving public auditing for secure cloud storage,’’ IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013.

S. Tanada, H. Suzuki, K. Naito, and A. Watanable, ‘‘Proposal for secure group communication using encryption technology,’’ in Proc. 9th Int. Conf. Mobile Comput. Ubiquitous Netw., Oct. 2016, pp. 1–6.

J. Zhou et al., ‘‘Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation,’’ Comput. J., vol. 60, no. 8, pp. 1210–1222, Aug. 2017.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.