Confidentiality and Storage of Data in Cloud Environment

被引:2
作者
Mohit, Prerna [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2 | 2017年 / 516卷
关键词
Cloud storage; Security; IBE; Cryptography;
D O I
10.1007/978-981-10-3156-4_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we provide a secure storage of data in the cloud server using Identity-Based Encryption. Where the data owner shares the stored data with the cloud users on the basics of pay-as-you-use principle. The cloud user request for the encrypted data, stored on the cloud server's database (by applying encryption on keyword) and the server verifies the request by performing test on encrypted data. So, that illegal users or unauthorized servers cannot attack on the data.
引用
收藏
页码:289 / 295
页数:7
相关论文
共 10 条
[1]  
[Anonymous], LNCS
[2]  
Chang C., 2005, APPL CRYPTOGRAPHY NE
[3]   A model to compare cloud and non-cloud storage of Big Data [J].
Chang, Victor ;
Wills, Gary .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :56-76
[4]  
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5
[5]  
Goh E., 2003, IACR CRYPTOLOGY EPRI, V216
[6]   Secure conjunctive keyword search over encrypted data [J].
Golle, P ;
Staddon, J ;
Waters, B .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 :31-45
[7]  
Kurosawa K., 2012, FINANCIAL CRYPTOGRAP
[8]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[9]  
Yan LA, 2009, LECT NOTES COMPUT SC, V5931, P167
[10]   Efficient ID-based public auditing for the outsourced data in cloud storage [J].
Zhang, Jianhong ;
Dong, Qiaocui .
INFORMATION SCIENCES, 2016, 343 :1-14