Active Cloud Valuing for Revenue Expansion

prasad p, t v Sampath kumar

Abstract


Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud. In this paper we are further extending the basic MONA by adding the reliability as well as improving the scalability by increasing the number of group managers dynamically. This paper proposes how user can access data after the time out. The storage overhead and encryption computation cost of our scheme are independent with the number of revoked users.


Keywords


Cloud Computing, dynamic groups, data sharing, reliability, integrity, scalability,privacy-preserving.

References


Xuefeng Liu, Yuqing Zhang, Boyang Wang, and

Jingbo Yan, “Mona: Secure Multi-Owner

Data Sharing for Dynamic Groups in the

Cloud”, IEEE TRANSACTIONS ON

PARALLEL AND DISTRIBUTED SYSTEMS,

VOL. 24, NO. 6, JUNE 2013.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A.

Patterson, A. Rabkin, I. Stoica, and M.

Zaharia, “A View of Cloud Computing,”

Comm. ACM, vol.53, no. 4, pp. 50-58, Apr. 2010.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial

Cryptography and Data Security (FC), pp. 136- 149, Jan. 2010.

E. Goh, H. Shacham, N. Modadugu, and D

.Boneh, “Sirius: Securing Remote Untrusted

Storage,” Proc. Network and Distributed

Systems Security Symp. (NDSS), pp. 131-

, 2003. [5]B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing

Shared Data with Large Groups in the

Cloud,” Proc. 10th Int’l Conf. Applied

Cryptography and Network Security, pp. 507-525, 2012.

A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted

Data,” Proc. ACM Conf. Computer and

Comm. Security (CCS), pp. 89-98, 2006.

D. Pointcheval and J. Stern, “Security

Arguments for Digital Signatures and Blind

Signatures,” J. Cryptology, vol. 13, no. 3, pp.

-396, 2000.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure

Provenance: The Essential of Bread and Butter of Data Forensics in Cloud

Computing,” Proc. ACM Symp. Information,

Computer and Comm. Security, pp. 282-292, 2010.

D. Naor, M. Naor, and J.B. Lotspiech,

“Revocation and Tracing Schemes for Stateless Receivers,” Proc. Ann. Int’l

Cryptology Conf. Advances in Cryptology

(CRYPTO), pp. 41-62, 2001. [11] D. Boneh

and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l

Cryptology Conf. Advances in Cryptology

(CRYPTO), pp. 213-229, 2001.

D. Boneh, X. Boyen, and H. Shacham, “Short Group Signature,” Proc. Int’l Cryptology

Conf. Advances in Cryptology (CRYPTO), pp. 41-55,2004.

B. Sheng and Q. Li, “Verifiable

PrivacyPreserving Range Query in Two-

Tiered Sensor Networks,” Proc. IEEE

INFOCOM, pp. 46- 50, 2008.

D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” Proc. Int’l

Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 514-532, 2001.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.