Author : Ahalya Mary J 1
Date of Publication :31st March 2018
Abstract: The main objective of this paper is to explain the sharing of data in cloud., we explain how data can be stored and shared in an efficient, secure and convenient way using a system which incorporates Key-Aggregated Cryptosystem to produce cipher texts of a constant size. By using a compact key, which is made by combining a set of secret keys, we can share our files with others or store in a very limited secure storage.
Reference :
-
- K. Kent and M. Souppaya. (1992). Guide to Computer Security Log Management, NIST Special Publication 800- 92 [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-92/SP800- 92.pdf
- U.S. Department of Health and Human Services. (2011, Sep.). HIPAA—General Information [Online]. Available: https://www.cms.gov/ hipaageninfo
- PCI Security Standards Council. (2006, Sep.) Payment Card Industry (PCI) Data Security Standard— Security Audit Procedures Version 1.1 [Online]. Available: https://www.pcisecuritystandards.org/pdfs/pci−audit−proce dures−v1-1.pdf
- Sarbanes-Oxley Act 2002. (2002, Sep.). A Guide to the Sarbanes-Oxley Act [Online]. Available: http://www.soxlaw.com/
- C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, Network Working Group, Aug. 2001.