Filters








1,144 Hits in 4.8 sec

Anonymous and confidential file sharing over untrusted clouds [article]

Stefan Contiu, Sébastien Vaucher, Rafael Pires, Marcelo Pasin, Pascal Felber, Laurent Réveillère
2019 arXiv   pre-print
Using public cloud services for storing and sharing confidential data requires end users to cryptographically protect both the data and the access to the data.  ...  In some cases, the identity of end users needs to remain confidential against the cloud provider and fellow users accessing the data.  ...  Even though our work targets file sharing over untrusted cloud storages, the proposed solution can be adapted to a wider spectrum of anonymous broadcast contexts such as media streaming or peer-to-peer  ... 
arXiv:1907.06466v1 fatcat:cr5afvm3inboxcyodlaqfnzpzy

Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology

Ravi C.B, Mohan K
2014 IOSR Journal of Computer Engineering  
By aid of group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others.  ...  Data of the different owners in the group shares data with each other securely and preserving their identity from an untrusted cloud server is one of the challenging issues currently, due to the frequent  ...  Shiva Kumar G.S, Dept. of Computer Science and Engineering, SIT Mangalore. We also convey our thanks to all the staff members of SIT for helping in the project.  ... 
doi:10.9790/0661-162107073 fatcat:teuhr62bijeebjvyx4v62iywya

Secure Data Sharing With In Groups In The Cloud

Gouthami Velakanti*, Niranjan Reddy .P, Sravanthi Venishetty
2016 Zenodo  
Cloud computing refers to the delivery of computing resources over the Internet.  ...  Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications.  ...  Specifically, the cloud servers managed by cloud providers are not fully trusted by users while the data files stored in the cloud may be sensitive and confidential, such as business plans.  ... 
doi:10.5281/zenodo.59675 fatcat:4k2i7zzwebbutac6ax5zmq4ity

An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

Gagan Jain G C, Venkataravana Nayak K, Krishna Gudi
2014 IOSR Journal of Computer Engineering  
By using group signature and dynamic broadcast encryption techniques, only privileged cloud user can store and share data.  ...  As the low maintenance, cloud computing supply an capable solution for sharing group resource within cloud users.  ...  Specifically, cloud servers managed by cloud providers are not fully trusted by users while the data files stored in the cloud may be sensitive and confidential.  ... 
doi:10.9790/0661-1633140145 fatcat:dtxth5zxcza5xkxpteycynr33e

A Survey on Multi Owner Data Sharing for Dynamic Groups in the Cloud Securely

Sushma Nallamalli
2016 International Journal Of Engineering And Computer Science  
the revoked member is not able to upload or download files .By including group signature and stateless broadcast encryption techniques, any cloud user can anonymously share data with others .Meanwhile  ...  To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud.  ...  This approach presents the design of secure data sharing scheme, Mona, for dynamic groups in an untrusted cloud.  ... 
doi:10.18535/ijecs/v5i11.02 fatcat:o5357yml25bydk3moyy33zfnoa

Privacy Preserving and Load Balancing For Secure Cloud Storage

S. Sasikala, T. Karthick
2014 IOSR Journal of Computer Engineering  
And also by encryption and hashing techniques, such as Advanced Encryption Standard (AES), Merkle Hash Tree, any cloud user can anonymously share data with others.  ...  Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership.  ...  In [5] , files stored on the untrusted server include two parts: file metadata and file data.  ... 
doi:10.9790/0661-1614102106 fatcat:2ffjqpflmzgdlma4sh53qturhe

Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing

K. V. Uma Maheswari, Dr. Dhanaraj Cheelu
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
It should enable any cloud user to anonymously share data with others within the group and support efficient member revocation.  ...  Cloud computing provides an economical and efficient solution for sharing group resource among cloud users.  ...  Basic solution to secure the data over the untrusted cloud is to encrypt the data using attribute-based encryption to achieve secure data sharing for dynamic groups in the cloud by combining both the group  ... 
doi:10.32628/cseit2172846 fatcat:dfkinzufdra7pbhkzug4hhievy

Data Security and Privacy Protection Data Security and Privacy Protection in Public Cloud [article]

Yue Shi
2018 arXiv   pre-print
As in cloud computing, oceans of data will be stored. Data stored in public cloud would face both outside attacks and inside attacks since public cloud provider themselves are untrusted.  ...  In the paper, different mechanisms to protect data security and privacy in public cloud are discussed. A data security and privacy enabled multi-cloud architecture is proposed.  ...  file, L is the data size of saved file in each cloud, and n is the shares of files to be distributed.  ... 
arXiv:1812.05745v1 fatcat:prymyr473rcovbstjtanaczeru

Methodology of Implementing the Pulse code techniques for Distributed Optical Fiber Sensors by using FPGA: Cyclic Simplex Coding

Yelkal Mulualem
2016 International Journal of Computer Applications Technology and Research  
Anonymous network implement the anonymity of users and provide privacy. In this paper implement the anonymous of user by implementing anonymous tag generation.  ...  It greatly reduces the communication overhead between a log monitor and the logging cloud needed to answer queries on logs.  ...  For pseudonymising log file [9] the next approach is proposed i.e. syslog. The disadvantage of this approach is confidentiality and integrity of log file cannot be achieved.  ... 
doi:10.7753/ijcatr0503.1007 fatcat:sdnig642pbgr3oc6yi6ymbh6aa

Secure Private Key Distribution for Dynamic Groups in the Cloud

Miss. Sonali S. Goral
2018 International Journal for Research in Applied Science and Engineering Technology  
This gives the protection from the collusion attack that means user cannot get original data files even if they join with untrusted cloud.  ...  To achieve a functional and low-budget approach for sharing data within groups with group members in the cloud with not only low maintenance but also low management cost, the system can be proposed.  ...  To provide Access control, data confidentiality, anonymity, traceability and efficiency are the main aim of the proposed system.  ... 
doi:10.22214/ijraset.2018.1256 fatcat:vrhyqu5iivajblwakfijcs22ai

Survey on Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

Thukkaiprasanth. T, Dr. M. Ramesh Kumar, Sivagurunathan. A, UdhayaKumar. C, Vignesh.R. S, V.S.B college of Engineering Technical Campus
2020 International Journal of Engineering Research and  
Shockingly, sharing data in a multi-proprietor way while shielding data and identity security from an untrusted cloud is still a testing issue, in light of the constant change of the enlistment.  ...  We present a safe and security ensuring access control to customers, which guarantee any part in a social event to anonymously utilize the cloud resource.  ...  By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others.  ... 
doi:10.17577/ijertv9is010306 fatcat:etkiwgmbzben7gtpyjw2ffwmsa

Securing Shared Data in Cloud Computing by using Cryptographic Schemes

Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour
2016 International Journal of Computer Applications  
Problems related to the lack of data confidentiality and integrity represent the number one problem encountered in cloud infrastructure and that restrains users and a number of organizations to benefit  ...  Sharing data using cloud computing can be a good solution to profit from reduced costs, scalability, flexibility and more advantages that user can get from the cloud infrastructure.  ...  other characteristics like: flexibility, scalability, and confidentiality of the access control system in untrusted cloud.  ... 
doi:10.5120/ijca2016910942 fatcat:jbo3r3engffbpm7ltlvwzggrsi

SECURE DATA SHARING IN CLOUDS USING USER REVOCATIONS

PriyankaV Surnar, SG Swami, a b
2018 International Journal of Advanced Research  
The protected data sharing over the cloud among the group of users is ensured without the elliptic curve or bilinear Diffie-Hellman problem (BDH) cryptographic reencryption. 3.  ...  The planned method ensures the confidentiality of the data on the cloud by using symmetric encryption. 2.  ...  The confidentiality of the data is ensured by storing encrypted data over the cloud.  ... 
doi:10.21474/ijar01/7170 fatcat:iinwilewsjgwjj52zzdcyaoc2q

A Survey on Different Techniques Used in Decentralized Cloud Computing

Mohini Tanaji Patil
2016 International Journal of Science and Engineering Applications  
This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity of the series without knowing the user's identity before storing data.  ...  These schemes also prevents replay attacks and supports creation, modification, and reading data stored in the cloud.  ...  Hierarchical Attribute Based Encryption for Fine Grained Access Control [6] is useful for organizations to efficiently share confidential data on cloud servers.  ... 
doi:10.7753/ijsea0502.1007 fatcat:wsv2oqg7qrh3neam5xdmzixgtu

Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing

Priya Chaturvedi
2019 International Journal for Research in Applied Science and Engineering Technology  
Data confidential and enforce access control policies correctly. However, security and confidentiality is not provided now a day because the stored data is shared among many service providers.  ...  Keywords: cloud computing, Attribute based encryption cloud service provide, Cloud sharing. I.  ...  an error message.IT will benefit in upgrading security without taking it to t he knowledge of trespasser and will not give load on process of transferring data over cloud.  ... 
doi:10.22214/ijraset.2019.6154 fatcat:6adyu2c2zvcsncxkk3tza2r45e
« Previous Showing results 1 — 15 out of 1,144 results