International Journal of Innovative Research in Engineering and Management
Year: 2018, Volume: 5, Issue: 1
First page : ( 42) Last page : ( 49)
Online ISSN : 2350-0557.
DOI: 10.21276/ijirem.2018.5.1.9 | DOI URL: https://doi.org/10.21276/ijirem.2018.5.1.9 Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr.Prasanna Kumar.R , Porselvan G , Prem Kumar S, Robinlash F
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. In order to provide security to the shared secret data, the cryptographic techniques are usually applied. However, the data cryptographic key is protected by the two factors. Only if both the factors works, the secrecy of the cryptographic key is held. 2) The cryptographic key can be revoked efficiently by integrating the proxy reencryption and key separation techniques. 3) The data is protected in a fine-grained way by adopting the attribute based encryption technique. Furthermore, the security analysis and performance evaluation show that our proposal is secure and efficient, respectively.
[1]. Haifeng Lu, Chuan Heng Foh, Yong gang Wen, and Jianfei Cai, “Delay-Optimized File Retrieval under LT-Based Cloud Storage”, IEEE transactions on cloud computing, vol. 5, no. 4, october-december 2017
[2]. Yong Cui , Zeqi Lai, Xin Wang, and Ningwei Dai,” QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services”, IEEE transactions on mobile computing, vol. 16, no. 12, december 2017
[3]. Hui Tian, Yuxiang Chen, Chin-Chen Chang,Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu,” DynamicHash-Table Based Public Auditing for Secure Cloud Storage”, IEEE transactions on services computing, vol. 10, no. 5, september/october 2017
[4]. Jiguo Li, Xiaonan Lin, Yichen Zhang, and Jinguang Han,” KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage”, IEEE transactions on services computing, vol. 10, no. 5, september/october 2017
[5]. Guoxin Liu and Haiying Shen, “Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers”, IEEE/ACM transactions on networking, vol. 25, no. 4, august 2017
[6]. Guoxin Liu, Haiying Shen, and Haoyu Wang, ” An Economical and SLO-Guaranteed Cloud Storage Service Across Multiple Cloud Service Providers”, IEEE transactions on parallel and distributed systems, vol. 28, no. 9, september 2017
[7]. Jianwei Yin, Yan Tang, Shuiguang Deng, Ying Li, Wei Lo, Kexiong Dong, Albert Y. Zomaya, and Calton Pu,” ASSER: An Efficient, Reliable, and Cost-Effective Storage Scheme for Object-Based Cloud Storage Systems”, IEEE transactions on computers, vol. 66, no. 8, august 2017
[8]. Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage" IEEE transactions on parallel and distributed systems, vol. 25, no. 2, february 2014
[9]. Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo"Anonymous and Traceable Group Data Sharing in Cloud Computing", IEEE Transactions on Information Forensics and Security
[10]. Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun and Yang Xiang, Block Design-based Key Agreement for Group Data Sharing in Cloud Computing” IEEE Transactions on Dependable and Secure Computing .
[11]. Mazhar Ali, , Saif U. R. Malik, and Samee U. Khan, " Data Security for Cloud Environment with Semi-Trusted Third Party”IEEE transactions on cloud computing, vol. 5, no. 4, october-december 2017
[12]. Anmin Fu, Shui Yu, Yuqing Zhang, Huaqun Wang, and Chanying Huang,” NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users” , IEEE Transactions on Big Data.
[13]. Zhongma Zhu and Rui Jiang,” A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE transactions on parallel and distributed systems, vol. 27, no. 1, january 2016
[14]. Hao Dong, Chao Wu , Zhen Wei, and Yike Guo,” Dropping Activation Outputs With Localized First-LayerDeep Network for EnhancingUser Privacy and Data Security”IEEE transactions on information forensics and security, vol. 13, no. 3, march 2018
[15]. Suryadipta Majumdar, Taous Madi, Yushun Wang,Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi, ” User-Level Runtime Security Auditing for the Cloud”
[16]. Wenxiu Ding, Zheng Yan and Robert H. Deng, Fellow,” Privacy-Preserving Data Processing withFlexible Access Control”information, IEEE Transactions on Dependable and Secure Computing,
[17].Binanda Sengupta, Student Member, IEEE and Sushmita Ruj,” Efficient Proofs of Retrievability with PublicVerifiability for Dynamic Cloud Storage”, IEEE Transactions on Cloud Computing.
[18]. Youngjoo Shin, Dongyoung Koo, Joobeom Yun and Junbeom Hur Member,” Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage”,IEEE Transactions on Services Computing.
[19]. Nicolae Paladi, Christian Gehrmann, and Antonis Michalas,” Providing User Security Guarantees in Public Infrastructure Clouds” IEEE transactions on cloud computing, vol. 5, no. 3, july-september 2017
[20]. Zhitao Guan, Jing Li, Longfei Wu, Yue Zhang, Jun Wu, and Xiaojiang Du,” Achieving Efficient and Secure Data Acquisition forCloud-Supported Internet of Things in Smart Grid” IEEE internet of things journal, vol. 4, no. 6, december 2017
Professor, Department Of Computer Science And Engineering S.A. Engineering College, Chennai, Tamil Nadu,India
No. of Downloads: 15 | No. of Views: 1044
Preet Bhutani, Chandra Sekhar Dash.
August 2024 - Vol 11, Issue 4
Tushar Maurya, Saurav Kumar Singh, Vikram Thakur, Sachin Chawla.
June 2024 - Vol 11, Issue 3
Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi.
June 2024 - Vol 11, Issue 3