Author : Nagesh S 1
Date of Publication :11th July 2017
Abstract: In cloud giving security, ensures for the sharing information record. Sadly, in view of0the continuous variation of the participation, allocation files while giving protection careful is so far a difficult issue, specially for an untrusted0cloud on account of the arrangement assault. In this exploration work, we propose an ensured information sharing course of action for dynamic individuals. Right off the bat, we propose a protected course for key appointment with no secured correspondence channels, and the clients can safely get their private keys from social event boss. Moreover, our course of action can complete fine-grained find the opportunity to control, any client in the party can utilize the source in the cloud and denied clients can't get to the cloud again after they are repudiated. Thirdly, we can shield the plan from intrigue strike, which proposes that deny clients can't get the exceptional information record paying little regard to the probability that they outline with the untrusted cloud. This course of action can accomplish fine practicality, which gathers past clients require not to revive their private keys for the circumstance either another client appreciates the social event or a client is denied from the party.
Reference :
-
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, Apr. 2010.
- S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proc. Int. Conf. Financial Cryptography Data Security, Jan. 2010, pp. 136–149.
- M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. USENIX Conf. File Storage Technol., 2003, pp. 29–42.
- E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2003, pp. 131–145.
- G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43.
- S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98
- R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance: The essential of bread and butter of data forensics in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292.