Results 11 - 20
of
33
A Secure Multi-Owner Data Sharing and Load Balancing for Dynamic Groups in the Cloud
"... ABSTRACT -Cloud computing is an emerging computing premise in which consists of a virtualized pool of highly scalable computing resources and provided as an internet based computing where many organizations store, reacquire and modify data among cloud users. Major problem in cloud computing is shar ..."
Abstract
- Add to MetaCart
(Show Context)
ABSTRACT -Cloud computing is an emerging computing premise in which consists of a virtualized pool of highly scalable computing resources and provided as an internet based computing where many organizations store, reacquire and modify data among cloud users. Major problem in cloud computing is sharing data in a multi-owner manner, while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. The main aim is to provide secure multi-owner data sharing in dynamic groups. This poses a security challenge to the data stored inside cloud. As the result, the encryption computational cost is reduced; storage overhead and scheme are independent with the number of revoked users with rigorous proof and experiments. Load Balancing is also implemented to process the User requested job by allocating to the sub servers which will process the task by evaluating the CPU performance level.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
"... Abstract With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an un trusted cloud is still a challenging ..."
Abstract
- Add to MetaCart
Abstract With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an un trusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments. Introduction: Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the common use of a cloudshaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing consists of hardware and software resources made available on the Internet as managed third-party services. These services typically provide access to advanced software applications and high-end networks of server computers. The goal of cloud computing is to apply traditional supercomputing, or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. Cloud computing is recognized as an alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs), such as Amazon, are able to deliver various services to cloud users with the help of powerful datacenters. By migrating the local data management systems into cloud servers, users can enjoy high-quality services and save significant investments on their local infrastructures.
A Novel Approach for Secure Data Sharing in Multi- Owner groups in Cloud
"... Abstract: The cloud computing becoming a major platform for storing the group resources of any group and distributed those group resources among group member. But cloud is not the trusted partner for storing a secure data on it.In this paper we proposing a model by which we can store group resource ..."
Abstract
- Add to MetaCart
Abstract: The cloud computing becoming a major platform for storing the group resources of any group and distributed those group resources among group member. But cloud is not the trusted partner for storing a secure data on it.In this paper we proposing a model by which we can store group resources to cloud and can share those resources to group member. In a group it's not compulsory that the group member will fixed. A group member can join or can leave any time that group so we implemented proposed system for dynamic group with secure group signature and dynamic broad casting techniques. In this system we implemented group member revocation method also for adding or removing the group member.
On the Security of Three Public Auditing Schemes in Cloud Computing
"... Abstract Cloud computing provides a scalability environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. It is necessary for cloud service provider to offer an efficient audit service to check the integrity and availab ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract Cloud computing provides a scalability environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. It is necessary for cloud service provider to offer an efficient audit service to check the integrity and availability of the stored data in cloud. In this paper, we study three auditing schemes for stored data including the public auditing scheme with user revocation, the proxy provable data possession and the identity-based remote data possession checking. All three mechanisms claimed that their schemes satisfied the security property of correctness. It is regretful that this comment shows that an active adversary can arbitrary alter the cloud data to generate the valid auditing response which can pass the verification. Then, we discussed the origin of the security flaw and proposed methods to remedy the weakness. Our work can help cryptographers and engineers design and implement more secure and efficient auditing mechanism in the cloud.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
"... Abstract-The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key challenge to designing such encryption schemes lies in the efficient management of encryption keys. The desi ..."
Abstract
- Add to MetaCart
Abstract-The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key challenge to designing such encryption schemes lies in the efficient management of encryption keys. The desired flexibility of sharing any group of selected documents with any group of users demands different encryption keys to be used for different documents. However, this also implies the necessity of securely distributing to users a large number of keys for both encryption and search, and those users will have to securely store the received keys, and submit an equally large number of keyword trapdoors to the cloud in order to perform search over the shared data. The implied need for secure communication, storage, and complexity clearly renders the approach impractical. In this paper, we address this practical problem, which is largely neglected in the literature, by proposing the novel concept of keyaggregate searchable encryption (KASE) and instantiating the concept through a concrete KASE scheme, in which a data owner only needs to distribute a single key to a user for sharing a large number of documents, and the user only needs to submit a single trapdoor to the cloud for querying the shared documents. The security analysis and performance evaluation both confirm that our proposed schemes are provably secure and practically efficient.
Private Preserving Publically Checking for Shared Data in the Cloud Using Oruta
"... Abstract — As per the cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to doubt about the truth of something due to the presence of hardware/software failures and human err ..."
Abstract
- Add to MetaCart
Abstract — As per the cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to doubt about the truth of something due to the presence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently check the cloud data integrity without retrieving the entire data from the cloud server. In this paper, we propose a novel private-preserving mechanism that supports publically checking on shared data stored in the cloud. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently check the shared data integrity without retrieving the entire file. Our experimental results show the effectiveness and efficiency of our mechanism when checking shared data integrity. Index Terms—Public checking, private-preserving, shared data, cloud computing, Ring signature. 1
Secure Data sharing in dynamic groups for cloud storage with backup
"... manager ..."
(Show Context)
A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing
"... Now a days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A user must be concerning about the protection and correctness of his data when he outsources his data to remote data storage as a cloud. Public auditing mecha ..."
Abstract
- Add to MetaCart
(Show Context)
Now a days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A user must be concerning about the protection and correctness of his data when he outsources his data to remote data storage as a cloud. Public auditing mechanism enables a user to verify the correctness and integrity of his data with the use of Third Party Auditor (TPA). Public auditing techniques perform auditing task without downloading the whole file. This reduces server overhead. Privacy preserving public auditing do not reveal the identity of the user. This paper describes various privacy preserving public auditing techniques. It also shows comparative study among them.
Key Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage 1K.Manohar, 2R. Anil Kumar, 3Dr.S.Prem Kumar
"... Abstract — The ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferre ..."
Abstract
- Add to MetaCart
Abstract — The ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different encryption keys to be used for different documents. On the other hand, this involves the need of securely distributing to users by a large number of keys for both encryption and search, and those users have to progress to store the received keys. The indirect need for secure communication, storage, and complexity clearly cause the unreasonable approach. In this paper, we concentrate on this practical problem, by suggesting the novel concept of key aggregate searchable encryption (KASE) and instantiating the idea through a real KASE scheme, in which a data owner wants to share out a single key to a user for distributing a large number of documents, and the user needs to present a single trapdoor to the cloud for questioning the shared documents. Keywords—data sharing, Searchable encryption, data privacy, cloud storage 1
Research Article A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage
"... Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and con ..."
Abstract
- Add to MetaCart
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage.The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. 1.