Results 21 - 30
of
33
unknown title
"... Sharing group resource among cloud users is a major problem, so cloud computing provides an economical and efficient solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still a challenging issue. In this paper, We propose a secure multi-owner ..."
Abstract
- Add to MetaCart
(Show Context)
Sharing group resource among cloud users is a major problem, so cloud computing provides an economical and efficient solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still a challenging issue. In this paper, We propose a secure multi-owner data sharing scheme, for dynamic group in the cloud. By providing group signature and dynamic broadcast encryption techniques, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, we analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as a secure and stronger forms of authentication, and allowing them to install across multiple machines. We provide a multiple levels of security to share data among multi-owner manner. First the user selects the pre-selected image to login. Then selects an image from the grid of images. Then OTP is generated automatically and sent to corresponding e-mail account.
RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for Groups in Cloud
"... This paper presents various issues related to privacy and security while storing user’s data on untrusted cloud. In today’s world Sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these cloud service providers and cl ..."
Abstract
- Add to MetaCart
(Show Context)
This paper presents various issues related to privacy and security while storing user’s data on untrusted cloud. In today’s world Sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these cloud service providers and cloud security in general. In this paper system proposes a secure multi-owner data sharing scheme, for dynamic group in the cloud. By providing group signature and encryption techniques, any cloud user can securely share data with others. The main objective of this paper include: to provide security for dynamic group system integrates Image based authentication and one time password (OTP) to achieve high level of security. In addition system identified some limitations in the same approach in terms of reliability and scalability.To resolve the drawbacksystem extends the basic MONA by adding the reliability as well as improving the scalability by growing the backup group managers dynamically. In this method System further presenting how system manage the risks like failure of group manager by increasing the number of backup group manager, sagging of group manager in case number of requests more.This method claims required reliability,security,scalability and most importantly efficiency..
Effective Outsourcing Multiparty Computation Supporting Heterogeneous
"... Abstract: These days, numerous associations outsource information storing to the cloud such that a part of an association (data owner) can share information or data easily among other members (clients). Because of the presence of security concerns in the cloud, both managers and clients are recommen ..."
Abstract
- Add to MetaCart
Abstract: These days, numerous associations outsource information storing to the cloud such that a part of an association (data owner) can share information or data easily among other members (clients). Because of the presence of security concerns in the cloud, both managers and clients are recommended to check the integrity of cloud information with Provable Information Ownership (PIO) before further use of information. Nonetheless, past strategy outsourcing the information and application to a gathering part causes the security and protection issues to turn into a discriminating concern. In that framework security and protection properties are not completely dissected.. We have recognized five most illustrative security and protection qualities (i.e. confidentiality, integrity, availability, accountability, and privacy-preservability). Starting with these characteristics, we exhibit the connections among them, the vulnerabilities that may be misused by aggressors, the hazard models, and in addition existing protection
ww.ijcert.org Public Reviewing for Imparted Information to Effective Client Repudiation in Cloud Computing
, 2014
"... Abstract:-With promotion of cloud administrations, different clients effectively impart and overhaul their information through distributed storage. For information uprightness and consistency in the distributed storage, the review mechanisms were proposed. Be that as it may, existing methodologies h ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract:-With promotion of cloud administrations, different clients effectively impart and overhaul their information through distributed storage. For information uprightness and consistency in the distributed storage, the review mechanisms were proposed. Be that as it may, existing methodologies have some security vulnerabilities and oblige a ton of computational overheads. This paper proposes a protected and proficient review mechanism for element imparted information in distributed storage. The proposed plan keeps vindictive cloud service providers from misleading an examiner. In addition, with information storing and offering administrations in the cloud, clients can without much of a stretch alter and offer information as a gathering to guarantee offer information uprightness can be checked openly, clients in the gathering need to process marks on all the squares in imparted information. Distinctive pieces in imparted information are for the most part marked by diverse clients because of information alterations performed by distinctive clients. For security reasons, once a client is disavowed from the gathering, the squares which were awhile ago marked by this denied client must be re-marked by a current client. The straight forward system, which permits a current client to download the comparing piece of imparted information and re-sign it amid client repudiation, is wasteful because of the expansive size of imparted information in the cloud. In this paper, we propose a novel open evaluating mechanism for the
Offering Secure Information in the Cloud for the Dynamic Group
"... Abstract-Cloud computing is a developing processing ideal model in which assets of the registering framework are given as administrations over the Web. Offering gathering asset among cloud clients is a real issue, so Cloud computing gives an efficient and effective compact. Mona, secure information ..."
Abstract
- Add to MetaCart
Abstract-Cloud computing is a developing processing ideal model in which assets of the registering framework are given as administrations over the Web. Offering gathering asset among cloud clients is a real issue, so Cloud computing gives an efficient and effective compact. Mona, secure information imparting in a multi-manager way for element gatherings preserve information, identity protection from an untrusted cloud and permits successive change of the participation. In this paper, we propose a confined multi manager information offering scheme, for element amasses in the cloud. By leveraging group signature and dynamic show encryption systems, any cloud client can secretly impart information to others. Proposing another model for offering Secure Information in the Cloud for the dynamic group.
1 A Novel Approach for an Enhanced Oruta with Data Freshness
"... Cloud computing has become an emerging service because of the ease of its use. Its vast usage has raised some serious issues. When cloud has become a large storage for the data, the security and integrity have become most serious issues. Users must be concerning with the data stored remotely. Many a ..."
Abstract
- Add to MetaCart
(Show Context)
Cloud computing has become an emerging service because of the ease of its use. Its vast usage has raised some serious issues. When cloud has become a large storage for the data, the security and integrity have become most serious issues. Users must be concerning with the data stored remotely. Many auditing schemes have been introduced for public auditing which audits data without downloading the whole data. Among them, Oruta is privacy preserving public auditing scheme which uses ring signature that audits data with identity privacy. But Oruta lacks with data freshness, batch auditing and traceability. We have introduced an enhanced scheme which enables data freshness within Oruta. Data freshness is to update data with the latest one.
Providing Privacy and Data Integrity in Dynamic Group Using TPA Over Cloud Computing
"... Abstract:- We propose Panda, a novel public auditing mechanism for the integrity of shared data with efficient user revo-cation in the cloud. In our mechanism, by utilizing the idea of proxy resignatures, once a user in the group is revoked, the cloud is able to resign the blocks, which were signed ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract:- We propose Panda, a novel public auditing mechanism for the integrity of shared data with efficient user revo-cation in the cloud. In our mechanism, by utilizing the idea of proxy resignatures, once a user in the group is revoked, the cloud is able to resign the blocks, which were signed by the revoked user, with a re-signing key. As a result, the efficiency of user revocation can be significantly improved, and computation and communication resources of existing users can be easily saved. Meanwhile, the cloud, which is not in the same trusted domain with each user, is only able to convert a signature of the revoked user into a signature of an existing user on the same block, but it cannot sign arbitrary blocks on behalf of either the revoked user or an existing user. By designing a new proxy re-signature scheme with nice properties, which traditional proxy re signatures do not have, our mechanism is always able to check the integrity of shared data without retrieving the entire data from the cloud. Here we have to focus on data transmitted with secure manner and revocation in cloud in open
unknown title
"... Abstract — The capacity of in particular sharing encrypted data with divergent to clients through public cloud storage may truly ease security trouble, by plausibility data uncover in the cloud. A key test to plan such encryption thought lies in the very much sorted out administration encryption key ..."
Abstract
- Add to MetaCart
Abstract — The capacity of in particular sharing encrypted data with divergent to clients through public cloud storage may truly ease security trouble, by plausibility data uncover in the cloud. A key test to plan such encryption thought lies in the very much sorted out administration encryption keys. The favored adaptability of distributing any attaining so as to gather reports with any gathering of clients weight distinctive encryption keys to be utilized for diverse archives. Then again, this includes the need of safely disseminating to clients by a substantial number of keys for both encryption and seeks, and those clients need to advance to store the got keys. The aberrant requirement for secure correspondence, storage, and many-sided quality plainly cause the outlandish methodology. In this paper, we focus on this viable issue, by recommending the novel idea of key aggregate searchable encryption (KASE) and instantiating the thought through a genuine KASE plan, in which a data proprietor needs to share out a solitary key to a client for disseminating an extensive number of reports, and the client needs to display a solitary trapdoor to the cloud for scrutinizing the mutual archives. Keywords—data sharing, Searchable encryption, data privacy, cloud storage
A Dynamic Secure Multi Owner Data Sharing Scheme Over Cloud Computing 1NUTAKKI PRASAD, 2K.KIRAN KUMAR
"... Abstract: Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all g ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all group members can store and alter data while protecting data and identity privacy from an untrusted cloud server, due to the frequent change of the membership. so secure multi-owner data sharing scheme for dynamic groups in the cloud computing have been projected which absorb addition of group signature and broadcast encryption techniques. However this system also recognized some boundaries in terms of competence and security. since multi-owner data storing and sharing in a dynamic surroundings dumps enormous amount of data files in the cloud, which leftovers in cloud for imprecise period of time. The confidential information stored may changed by service providers. To maintain cloud file’s security and privacy regular elimination of unwanted files is needed. To determine this drawback we propose new framework which is Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud i.e MONA that remove unnecessary files automatically when the predefined time period for sharing specified by data owner has been run out which improve performance of the system in terms of security and efficiency. Also this method decreases the overhead at the time of upload and download file in the cloud. At last proposed method by name Multi Owner Data Sharing over Cloud (MODOC) declares required efficiency and most importantly security. We apply a working prototype of the MODOC method and assess its performance based on the time addicted during various operations the
1N.Mounika,2N.Parushuram,3Dr.S.Prem Kumar
"... Abstract: Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all g ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract: Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all group members can store and alter data while protecting data and identity privacy from an untrusted cloud server, due to the frequent change of the membership. so secure multi-owner data sharing scheme for dynamic groups in the cloud computing have been projected which absorb addition of group signature and broadcast encryption techniques. However this system also recognized some boundaries in terms of competence and security. since multi-owner data storing and sharing in a dynamic surroundings dumps enormous amount of data files in the cloud, which leftovers in cloud for imprecise period of time. The confidential information stored may changed by service providers. To maintain cloud file’s security and privacy regular elimination of unwanted files is needed. To determine this drawback we propose new framework which is Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud i.e MONA that remove unnecessary files automatically when the predefined time period for sharing specified by data owner has been run out which improve performance of the system in terms of security and efficiency. Also this method decreases the overhead at the time of upload and download file in the cloud. At last proposed method by name Multi Owner Data Sharing over Cloud (MODOC) declares required efficiency and most importantly security. We apply a working