PRINCIPAL COLLECTION AND SECURITY SERVICE IS MODIFY DATA SHARING IN CLOUD TECHNIQUES
Abstract
We take different security techniques of our model in the sharing method. We take different application in schemes in the schemes is the first public key patient security encryption is flexible hierarchy. We take a secure different owner data destitutions model, for dynamic cloud computing model. Is providing group signature and dynamic connections  encryption models different cloud user is securely share data with different providers the storage is lorded and encryption security cost of the scheme is different with the number of taken users. In addition, we find e the security model with different proofs every time Password is one of the finding and most popular forms of security message forward is used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication to install across multiple machines the users different levels of security to destitute data between different owner manner First the user selects the general model selected image to login Then selects an image from the grid of images the OTP is generated automatically and sent to corresponding e-mail account is different.
Index Terms: Cloud computing, broadcast encryption.
Full Text:
PDFReferences
X.Liu, B. Wang, Y.Zhang, and J.Yan,†Mona: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud,â€IEEE Computer Society,vol. 24,no. 6,June. 2013
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,†Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
G.Ateniese, R. Burns, R.urtmola, J.Herring, L. Kissner, Z. Peterson, and D.Song, “Deduplication in cloud storage using side channels in cloud services,†Oct 2008
D. Boneh, X. Boyen, and E. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,†Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp. 440-456, 2005.
K. D. Bowers, A. Juels, and A. Oprea, â€Hail: A highavailability and integrity layer for cloud storage,†in Proc. Of CCS’09, 2009, pp. 187-198
A. Fiat and M. Naor, “Broadcast Encryption,†Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993.
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,†Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,†Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003
S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.
B. Sheng and Q. Li, “Verifiable Privacy-Preserving Range Queryin Two-Tiered Sensor Networks,†Proc. IEEE INFOCOM, pp. 46-50, 2008
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing,†Proc. IEEE INFOCOM, pp. 525-533, 2010
B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud,†Proc. 10th Int’l Conf. Applied Cryptography and Network Security, pp. 507-525, 2012.
C. Wang, Q. Wang, K. Ren, N. cao, and W. Lou,â€Towards Secure and Dependable Storage Services in Cloud Computing,†IEEE Services Computing, pp. 1939-1374, 2011
Q. Wang, K. Ren, W. Lou, and Y.Zhang, â€Depandable and secure sensor data storage with dynamic integrity assurance,†in proc. of IEEE INFOCOM’09, Rio de Janeiro, Brazil, April 2009.
C. Wang, Q. Wang, Kui Ren, and W. Lou, â€Ensuring Data Storage Security in Cloud Computing,†in proc. of IWQos’09,July 2009,pp.1-9.
B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,†Proc. Int’l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,†Proc. IEEE INFOCOM, pp. 534-542, 2010
Refbacks
- There are currently no refbacks.