Open Access   Article Go Back

A Study on Secure Sharing of Application Data in Cloud Computing

P. Kiran Kumar Naik1 , GV. Ramesh Babu2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 162-166, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.162166

Online published on Mar 20, 2019

Copyright © P. Kiran Kumar Naik, GV. Ramesh Babu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Kiran Kumar Naik, GV. Ramesh Babu, “A Study on Secure Sharing of Application Data in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.162-166, 2019.

MLA Style Citation: P. Kiran Kumar Naik, GV. Ramesh Babu "A Study on Secure Sharing of Application Data in Cloud Computing." International Journal of Computer Sciences and Engineering 07.06 (2019): 162-166.

APA Style Citation: P. Kiran Kumar Naik, GV. Ramesh Babu, (2019). A Study on Secure Sharing of Application Data in Cloud Computing. International Journal of Computer Sciences and Engineering, 07(06), 162-166.

BibTex Style Citation:
@article{Naik_2019,
author = {P. Kiran Kumar Naik, GV. Ramesh Babu},
title = {A Study on Secure Sharing of Application Data in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {162-166},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=891},
doi = {https://doi.org/10.26438/ijcse/v7i6.162166}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.162166}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=891
TI - A Study on Secure Sharing of Application Data in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - P. Kiran Kumar Naik, GV. Ramesh Babu
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 162-166
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud clients utilizes "Cloud storage" administration to have their information in the cloud. Get to control benefit gave by cloud is accustomed to giving assurance against unapproved access to information. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is generally considered for information get to control in distributed storage. The current CP-ABE is hard to apply in multi-specialist distributed storage because of the characteristic repudiation issue. The proposed revocable multi-specialist CP-ABE plot gives answer for the characteristic denial issue. The proposed plot refreshes the segments of the disavowed quality just and produces most recent mystery keys for the repudiated credit and advances it to the non renounced clients who have the properties as denied traits. The Backward security and Forward security is kept up. On the off chance that the repudiated client goes into the framework again by doing the enlistment procedure implies, the specific client is recognized by means of the character card detail in the renouncement rundown and they are not permit in the framework, so that these clients are halted at the enrolment stage itself.

Key-Words / Index Term

Cloud Storage, Security, Cloud, Privacy

References

[1]. J. Bethen court, A. Sahai, and B. Waters, “Cipher text Policy Attribute Based Encryption,” in Proc. IEEE Symp. Security and privacy (S&P07), 2007, pp. 321-334.
[2]. B. Waters, “Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” in Proc. 4th Int l Conf. Practice and Theory in Public Key Cryptography (PKC 11), 2011, pp. 53-70.
[3]. V. Goyal, A. Jain,O. Pandey, and A. Sahai, ”Bounded Cipher text Policy Attribute Based Encryption,” in Proc. 35th Int l Colloquium on Automata, Languages, and Programming (ICALP08), 2008, pp. 579-591.
[4]. A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully Secure Functional Encryption: Attribute Based Encryption and (Hierarchical) Inner Product Encryption,” in Proc. Advances in Cryptology EUROCRYPT 10, 2010, pp. 62-91.
[5]. M. Chase, “Multi-Authority Attribute Based Encryption,” in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC 07), 2007, pp. 515-534.
[6]. M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in Proc. 16th ACM Conf. Computer and Comm. Security (CCS 09), 2009,pp. 121-130.
[7]. A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” in Proc. Advances in Cryptology EUROCRYPT 11, 2011, pp. 568-588.
[8]. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ”Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131- 143, Jan. 2013.
[9]. S. Jahid, P. Mittal, and N. Borisov, “Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,” in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS 11), 2011, pp. 411- 415.
[10].S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” in Proc. 10th IEEE Int?l Conf. Trust- Com, 2011, pp. 91-98.
[11].D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proc. 21st Ann. Int l Cryptology Conf.: Advances in Cryptology CRYPTO 01, 2001, pp. 213-229.