A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey on Block Design-based Key Agreement for Group Data Sharing in Cloud Computing
2020
International Journal of Engineering Research and
Shockingly, sharing data in a multi-proprietor way while shielding data and identity security from an untrusted cloud is still a testing issue, in light of the constant change of the enlistment. ...
Disseminated figuring gives a traditionalist and gainful response for sharing social event resource among cloud customers. ...
In this paper, we present a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing. ...
doi:10.17577/ijertv9is010306
fatcat:etkiwgmbzben7gtpyjw2ffwmsa
Block Design Key for Secure Data Sharing in Cloud Computing
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
We have a susceptibility to estimate Block design key for secure data sharing in cloud, based on key agreement protocol with in which TPA verifies the malicious user from the group. ...
Sharing Data in cloud allows multiple participants to share the group of data we are gifting a distinctive block design-based key agreement protocol that supports multiple participants, in whatever the ...
CONCLUSION We proposed the block design key for secure data sharing in cloud, where we are providing security for cloud storage. ...
doi:10.32628/cseit1953107
fatcat:7l7whbaqo5gbhov4fczn7u47s4
Secure and Optimized Data Sharing Model Group in Healthcare Cloud Environment
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In this paper, we propose the block-design based key agreement protocol in order to share the data securely and the design provides fault-detection and fault-tolerance. ...
The group-data model PSM is given with the block-based design, which decides how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column. ...
It brings the concept of group-key that the multiple participants generate to share data in a secure manner. The group members make key-agreement to derive the common group-key. ...
doi:10.35940/ijitee.a4602.119119
fatcat:jsspjopwqnb2tez7byhf5soriy
Framework for Secure Data Sharing in Dynamic Group Using Public Cloud
2018
International Journal for Research in Applied Science and Engineering Technology
Based on the proposed group data sharing model, we present general formulas for generating the random group key for multiple users. ...
To provide security to the cloud, key agreement protocol have played a very important role in an efficient manner. ...
Deepa, Assistant Professor of Department of Computer Science and Engineering and Ms. P. ...
doi:10.22214/ijraset.2018.3510
fatcat:hb7uioyyazcg5kfgspj36essga
Security and Privacy Based Data Sharing in Cloud Computing
2018
International Journal of Innovative Research in Engineering & Management
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. ...
The data is protected in a fine-grained way by adopting the attribute based encryption technique. ...
We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics. ...
doi:10.21276/ijirem.2018.5.1.9
fatcat:w4ieubijjvaybjrrj22fgtq3p4
A Formation of Cloud Data Sharing With Integrity and User Revocation
2017
International Journal Of Engineering And Computer Science
Cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. ...
In this paper, we propose Knox, a privacy-preserving auditing mechanism for data stored in the cloud and shared among a large number of users in a group. ...
In their scheme, if data owner shares group key among the users of group, revocation of any group user allow the group users to update their shared key. ...
doi:10.18535/ijecs/v6i5.39
fatcat:uv4qbqk4ercnnp3w4hobmsxvbe
Secure Personal Health Records access in Cloud Computing
2014
IOSR Journal of Computer Engineering
Patient Health Record (PHR) is a complete Patient related health data, which is getting stored in cloud computing to gain cost benefit and better access control. ...
In maintaining PHR, cloud computing plays an inevitable role, since small hospitals and physicians are not affordable to maintain own servers to keep PHRs for cost and security reasons . ...
By dividing files into file groups and encrypting each file group with a unique file-block key, the data owner can share the file groups with others through delivering the corresponding lockbox key, where ...
doi:10.9790/0661-16277074
fatcat:akwjyyvcxvfgvh7xtbbxnxowte
Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme
2016
International Journal of Computer Applications
In this connection when group users outsource their data to the cloud among the dynamic group no assurance about user privacy ,data integrity due to lack of data leakage and modifications among group users ...
CP-ABE based secure public auditing for protecting data integrity and authenticity without compromising security and authenticity and also for effective user revocation on dynamic group members. ...
In particular, this paper exploits the concept of group signature which computes the verification information required for integrity auditing of shared data. ...
doi:10.5120/ijca2016907722
fatcat:sen5wcwv4bhrpdbmhrv7fbhu6q
A Review on: Blockchain for Healthcare
2019
International Journal for Research in Applied Science and Engineering Technology
By connecting two or more hospital, hospitals can share their patient's data for further treatment. ...
With the help of unique key patient can itself upload patient's data on cloud as well by giving permission to hospital authority they can also view patient's data. ...
Hashem of "Providing HealthCare-as-a-Service in Cloud Computing" has proposed the use of cloud computing environment for big data analytics. ...
doi:10.22214/ijraset.2019.10002
fatcat:y6fiooiil5h2zlvgomz3wilz3y
Associative Big Data Sharing in Community Clouds: The MeePo Approach
2015
IEEE Cloud Computing
Operating Systems Design and Implemen FIGURE 2 . 2 Privileged access control (PAC) of shared data blocks by user groups in the MeePo cloud, where u and d represent individual users and data blocks. ...
view
abstraction
Signed views
Identity based,
view based
Public Web services for data
sharing
MeePo
Virtual disks used
Data encryption,
third-party key management
Privileged access
control ...
doi:10.1109/mcc.2015.123
fatcat:adbzl2vcc5bvfd4syxruluavle
New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms
2016
International Journal of Applied Engineering Research
The experimental results are analyzed and evaluated in terms of computation time, block size, key size, number of rounds and cycles per block. ...
But, it is not secure against the collusion of cloud data and it revokes the group of users during the user revocation in cloud system. ...
In this paper, the problem of designing public integrity auditing based shared dynamic data with group user revocation is analyzed. ...
doi:10.37622/ijaer/11.3.2016.1894-1899
fatcat:flcgqm5tkzgengqu45gar24pfa
Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation
2016
International Journal of Science and Research (IJSR)
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. ...
Recently, some research considers the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. ...
Introduction Cloud computing is an on-demand computing, and is also a kind of Internet-based computing which provides shared processing resources and also the data to computers and other devices on demand ...
doi:10.21275/v5i4.nov162762
fatcat:uoyda3nbzralfmhas3je3pj7vq
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
2016
IEEE transactions on computers
Recently some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. ...
The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. ...
In their scheme, if the data owner trivially shares a group key among the group users, the defection or revocation any group user will force the group users to update their shared key. ...
doi:10.1109/tc.2015.2389955
fatcat:bh4qgw44mjd5pjcbwz45kfwupa
An Exhaustive Review on Security Issues in Cloud Computing
2019
KSII Transactions on Internet and Information Systems
In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature. ...
The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. ...
The proposed group data sharing method provides access to multiple users in the public cloud using key agreement method. ...
doi:10.3837/tiis.2019.06.025
fatcat:d2lidmgohvashh6vbqchkvekti
CHALLENGES AND ISSUES ON THE RECENT DATA INTEGRITY PRESERVING TECHNIQUES IN THE MULTIUSER CLOUD
2019
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
The other issues like group signature and user revocation took the central part to ensure integrity of data in the cloud. ...
To reflect on the novelty of each approach, along with its performance in providing integrity for the cloud data stands as the primary objective of the study. ...
Just like the case of symmetrical Group key agreement, all members of the group are given a session key after negotiation. ...
doi:10.34218/ijcet.10.6.2019.002
fatcat:mayl46n4cnda5fctaemzlpwpna
« Previous
Showing results 1 — 15 out of 34,595 results