The Data Storage and Assured Sharing Methodology among Differing Groups in Cloud Computing

Polumahanti Sinddhuri, Ganiya Rajendra Kumar

Abstract


Cloud computing, with the qualities of inherent data sharing and low maintenance, gives a superior usage of assets. To safeguard data security, a typical approach is to encrypt data files before the customers transfer the encoded data into the cloud. Shockingly, it is hard to outline a safe and productive data sharing plan, particularly for dynamic groups in the cloud. The incessant change of the participation in document groups in this way, repudiation in these plans and the collusion attack straight increment with the quantity of data proprietors and the revoked users. To defeat the issue we propose a protected data sharing plan for dynamic individuals. To start with, we propose a protected route for key conveyance with no safe correspondence channels, and the users can safely acquire their private keys from group manager. Any client in the group can utilize the source in the cloud and revoked users can't get to the cloud again after they are revoked.


Keywords


Access control, Data sharing, groups, key distribution, cloud computing.

References


Zhongma Zhu, Rui Jiang, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, 2015.

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “A View of Cloud computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.2010.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp.136- 149, Jan. 2010.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

EGoh, H.Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.

Shucheng Yu, Cong Wang, Kui Ren, and Weijing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “AttributeBased Encryption for Fine-Grained Access Control of Encrypt Data,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98, 2006.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

B.Waters,“Ciphertext-PolicyAttribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” Proc. Int’l Conf.http://eprint.iacr.org/2008/290.pdf, 2008.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.