Secure Key Distribution and Data Sharing for Dynamic Groups in Multiple Clouds
Abstract
several purposes, mainly for large data storage and sharing data
in clouds. Here, users can share data for dynamic groups with
cost-effectively. Membership is frequently changing in a cloud.
The Existing system is using the protected (secure) commutation
channel for data sharing. This implementation is difficult for
practice. Still, the existing system is suffering from collusion
attack and insecure key distribution with a single cloud. There
is no assurance of the data confidentiality and accessibility. In
the proposed system, multiple cloud services are used to store
data. The System is proposing a safe way for key distribution
without using any protected communication channels, and the
user can safely get their private keys from group administrators
(managers).Any users in the gathering can use the source in
the cloud and denied users cannot get to the cloud once more.
The system provides fine-grained access control. Also, the system
supports the anti-collusion attack with an untrustworthy cloud.
Our system is proposing triple levels of encryption techniques and
a file is stored in a split format on multiple clouds in different
groups using a hybrid cloud. The system is providing secure
revocation.
Full Text:
PDFReferences
Zhongma Zhu and Rui Jiang, Secure Anti-Collusion Data Sharing Scheme
for Dynamic Groups in the Cloud IEEE Transaction Parallel Distribution
System, Jan. 2016.
. Liu, Y. Zhang, B. Wang, and J. Yang, Mona: A secure multi-owner data
sharing for the dynamic groups in the cloud. IEEE Transaction Parallel
Distribution System, Jun. 2013.
Z. Zhu, Z. Jiang, and R. Jiang The attack on Mona: Secure multi-owner
data sharing for dynamic groups in the cloud, International Conference
Inf. Sci. Cloud Compute 2013.
L. Zhou, V. Varadharajan, and M. Hitchens Achieving a secure role-based
access control on encrypted data in cloud storage. IEEE Transaction. Inf.
Forensics Security, Dec. 2013.
M. Nabeel, N. Shang, and E. Bertino, A Privacy preserving policy based
content sharing in public clouds. IEEE Transaction, Nov. 2013.
Nesrine Kaaniche1, Aymen Boudguiga, Maryline Laurent1, ID-Based
Cryptography for a Secure Cloud Data Storage. IEEE Cloud computing,
M. Armbrust and M. Zaharia A view of cloud computing. Communication
ACM, April 2010.
S. Kamara and Lauter, Cryptographic cloud storage. in International
Conferenec, Financial Cryptography Data Security, Jan. 2010.
S. Yu, C. Wang, K. Ren, and W. Lou, Achieving a secure, scalable, and
fine-grained data access control in cloud computing.ACM Symp. 2010.
R. Lu, X. Lin, X. Liang, and X. Shen, A Secure provenance-The
essential of bread and butter of a data forensics in cloud computing.
In ACM Symp. Inf. Compute. Communication and Security, 2010.
B. Waters, Ciphertext-policy attribute based encryption- An expressive,
efficient and provably secure realization. in International conference on
public key cryptography 2008.
Kallahalla and K. Fu, Plutus-A Scalable secure file sharing on untrusted
storage.In USENIX Conference on File Storage Technology 2003.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology