A Secure Cloud Data Sharing Scheme for Dynamic Groups with Revocation Mechanism

被引:0
作者
Radhakrishnan, Anusree [1 ]
Madha, Minu Lalitha [1 ]
机构
[1] Sree Buddha Coll Engn, Padanilam, Kerala, India
来源
SOFT COMPUTING SYSTEMS, ICSCS 2018 | 2018年 / 837卷
关键词
Encryption; Decryption; Authentication; Data security; ENCRYPTION;
D O I
10.1007/978-981-13-1936-5_54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud is an extensive data sharing system in which it provides an IT paradigm for to access shared pools of resources for any type of organizations. It also provides higher level services with minimal management effort. Using the concept of cloud, only lower maintenance is needed for the group members. Use of cloud computing helps us to ensure the storage capacity and it can be shared between the group members. Since we are outsourcing the data there is the necessity of providing security to the data. Since the members are changing dynamically here it is needed to ensure the guarantee of the data security. Especially the collusion attack should be avoided. The prescribed paper describes about a privacy preserving data sharing technology that uses key distribution method along with the group manager.
引用
收藏
页码:517 / 525
页数:9
相关论文
共 12 条
[1]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[2]  
Delerablee C, 2007, LECT NOTES COMPUT SC, V4575, P39
[3]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[4]  
Jiang Z., 2013, P INT C INF SCI CLOU, P185
[5]   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud [J].
Liu, Xuefeng ;
Zhang, Yuqing ;
Wang, Boyang ;
Yan, Jingbo .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1182-1191
[6]  
Lu R., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, P282
[7]  
Varun I, 2014, INT J COMPUT SCI MOB, V3, P730
[8]   Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J].
Waters, Brent .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :53-70
[9]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,
[10]   Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage [J].
Zhou, Lan ;
Varadharajan, Vijay ;
Hitchens, Michael .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :1947-1960