Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








34,595 Hits in 6.4 sec

Survey on Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

Thukkaiprasanth. T, Dr. M. Ramesh Kumar, Sivagurunathan. A, UdhayaKumar. C, Vignesh.R. S, V.S.B college of Engineering Technical Campus
2020 International Journal of Engineering Research and  
Shockingly, sharing data in a multi-proprietor way while shielding data and identity security from an untrusted cloud is still a testing issue, in light of the constant change of the enlistment.  ...  Disseminated figuring gives a traditionalist and gainful response for sharing social event resource among cloud customers.  ...  In this paper, we present a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing.  ... 
doi:10.17577/ijertv9is010306 fatcat:etkiwgmbzben7gtpyjw2ffwmsa

Block Design Key for Secure Data Sharing in Cloud Computing

Rashmi K, H. P. Mohan Kumar
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
We have a susceptibility to estimate Block design key for secure data sharing in cloud, based on key agreement protocol with in which TPA verifies the malicious user from the group.  ...  Sharing Data in cloud allows multiple participants to share the group of data we are gifting a distinctive block design-based key agreement protocol that supports multiple participants, in whatever the  ...  CONCLUSION We proposed the block design key for secure data sharing in cloud, where we are providing security for cloud storage.  ... 
doi:10.32628/cseit1953107 fatcat:7l7whbaqo5gbhov4fczn7u47s4

Secure and Optimized Data Sharing Model Group in Healthcare Cloud Environment

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, we propose the block-design based key agreement protocol in order to share the data securely and the design provides fault-detection and fault-tolerance.  ...  The group-data model PSM is given with the block-based design, which decides how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column.  ...  It brings the concept of group-key that the multiple participants generate to share data in a secure manner. The group members make key-agreement to derive the common group-key.  ... 
doi:10.35940/ijitee.a4602.119119 fatcat:jsspjopwqnb2tez7byhf5soriy

Framework for Secure Data Sharing in Dynamic Group Using Public Cloud

B. Manish Kumar
2018 International Journal for Research in Applied Science and Engineering Technology  
Based on the proposed group data sharing model, we present general formulas for generating the random group key for multiple users.  ...  To provide security to the cloud, key agreement protocol have played a very important role in an efficient manner.  ...  Deepa, Assistant Professor of Department of Computer Science and Engineering and Ms. P.  ... 
doi:10.22214/ijraset.2018.3510 fatcat:hb7uioyyazcg5kfgspj36essga

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  The data is protected in a fine-grained way by adopting the attribute based encryption technique.  ...  We have seen the possible methods and solutions for implementing the security and privacy in the big data analytics.  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4

A Formation of Cloud Data Sharing With Integrity and User Revocation

Prof. Butkar U D
2017 International Journal Of Engineering And Computer Science  
Cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group.  ...  In this paper, we propose Knox, a privacy-preserving auditing mechanism for data stored in the cloud and shared among a large number of users in a group.  ...  In their scheme, if data owner shares group key among the users of group, revocation of any group user allow the group users to update their shared key.  ... 
doi:10.18535/ijecs/v6i5.39 fatcat:uv4qbqk4ercnnp3w4hobmsxvbe

Secure Personal Health Records access in Cloud Computing

R Shreelakshmi, S. Pandiyarajan, Dr. J. Jagadeesan
2014 IOSR Journal of Computer Engineering  
Patient Health Record (PHR) is a complete Patient related health data, which is getting stored in cloud computing to gain cost benefit and better access control.  ...  In maintaining PHR, cloud computing plays an inevitable role, since small hospitals and physicians are not affordable to maintain own servers to keep PHRs for cost and security reasons .  ...  By dividing files into file groups and encrypting each file group with a unique file-block key, the data owner can share the file groups with others through delivering the corresponding lockbox key, where  ... 
doi:10.9790/0661-16277074 fatcat:akwjyyvcxvfgvh7xtbbxnxowte

Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme

M. Sravani, K. Santhi, B. Tarakeswara
2016 International Journal of Computer Applications  
In this connection when group users outsource their data to the cloud among the dynamic group no assurance about user privacy ,data integrity due to lack of data leakage and modifications among group users  ...  CP-ABE based secure public auditing for protecting data integrity and authenticity without compromising security and authenticity and also for effective user revocation on dynamic group members.  ...  In particular, this paper exploits the concept of group signature which computes the verification information required for integrity auditing of shared data.  ... 
doi:10.5120/ijca2016907722 fatcat:sen5wcwv4bhrpdbmhrv7fbhu6q

A Review on: Blockchain for Healthcare

Piyush Shende
2019 International Journal for Research in Applied Science and Engineering Technology  
By connecting two or more hospital, hospitals can share their patient's data for further treatment.  ...  With the help of unique key patient can itself upload patient's data on cloud as well by giving permission to hospital authority they can also view patient's data.  ...  Hashem of "Providing HealthCare-as-a-Service in Cloud Computing" has proposed the use of cloud computing environment for big data analytics.  ... 
doi:10.22214/ijraset.2019.10002 fatcat:y6fiooiil5h2zlvgomz3wilz3y

Associative Big Data Sharing in Community Clouds: The MeePo Approach

Yongwei Wu, Maomeng Su, Weiming Zheng, Kai Hwang, Albert Y. Zomaya
2015 IEEE Cloud Computing  
Operating Systems Design and Implemen FIGURE 2 . 2 Privileged access control (PAC) of shared data blocks by user groups in the MeePo cloud, where u and d represent individual users and data blocks.  ...  view abstraction Signed views Identity based, view based Public Web services for data sharing MeePo Virtual disks used Data encryption, third-party key management Privileged access control  ... 
doi:10.1109/mcc.2015.123 fatcat:adbzl2vcc5bvfd4syxruluavle

New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms

A. Emily Jenifer, S. Karthigaiveni
2016 International Journal of Applied Engineering Research  
The experimental results are analyzed and evaluated in terms of computation time, block size, key size, number of rounds and cycles per block.  ...  But, it is not secure against the collusion of cloud data and it revokes the group of users during the user revocation in cloud system.  ...  In this paper, the problem of designing public integrity auditing based shared dynamic data with group user revocation is analyzed.  ... 
doi:10.37622/ijaer/11.3.2016.1894-1899 fatcat:flcgqm5tkzgengqu45gar24pfa

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

2016 International Journal of Science and Research (IJSR)  
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving.  ...  Recently, some research considers the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server.  ...  Introduction Cloud computing is an on-demand computing, and is also a kind of Internet-based computing which provides shared processing resources and also the data to computers and other devices on demand  ... 
doi:10.21275/v5i4.nov162762 fatcat:uoyda3nbzralfmhas3je3pj7vq

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang, Xiaofeng Chen, Jianfeng Ma
2016 IEEE transactions on computers  
Recently some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data.  ...  The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature.  ...  In their scheme, if the data owner trivially shares a group key among the group users, the defection or revocation any group user will force the group users to update their shared key.  ... 
doi:10.1109/tc.2015.2389955 fatcat:bh4qgw44mjd5pjcbwz45kfwupa

An Exhaustive Review on Security Issues in Cloud Computing

2019 KSII Transactions on Internet and Information Systems  
In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.  ...  The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing.  ...  The proposed group data sharing method provides access to multiple users in the public cloud using key agreement method.  ... 
doi:10.3837/tiis.2019.06.025 fatcat:d2lidmgohvashh6vbqchkvekti

CHALLENGES AND ISSUES ON THE RECENT DATA INTEGRITY PRESERVING TECHNIQUES IN THE MULTIUSER CLOUD

K. AMBIKA, M. BALASINGH MOSES
2019 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY  
The other issues like group signature and user revocation took the central part to ensure integrity of data in the cloud.  ...  To reflect on the novelty of each approach, along with its performance in providing integrity for the cloud data stands as the primary objective of the study.  ...  Just like the case of symmetrical Group key agreement, all members of the group are given a session key after negotiation.  ... 
doi:10.34218/ijcet.10.6.2019.002 fatcat:mayl46n4cnda5fctaemzlpwpna
« Previous Showing results 1 — 15 out of 34,595 results