Submit Search
Upload
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing
•
0 likes
•
28 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I3970.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
Gf2511301134
Gf2511301134
IJERA Editor
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
489 493
489 493
Editor IJARCET
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Edadc
Edadc
ragh6
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Recommended
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
Gf2511301134
Gf2511301134
IJERA Editor
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
489 493
489 493
Editor IJARCET
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Edadc
Edadc
ragh6
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
20 74-1-pb
20 74-1-pb
Mahendra Sisodia
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Fog doc
Fog doc
priyanka reddy
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
I42024349
I42024349
IJERA Editor
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Fs2510501055
Fs2510501055
IJERA Editor
Paper id 27201433
Paper id 27201433
IJRAT
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
ijtsrd
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
Gf2511301134
Gf2511301134
IJERA Editor
More Related Content
What's hot
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
20 74-1-pb
20 74-1-pb
Mahendra Sisodia
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Fog doc
Fog doc
priyanka reddy
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
I42024349
I42024349
IJERA Editor
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Fs2510501055
Fs2510501055
IJERA Editor
Paper id 27201433
Paper id 27201433
IJRAT
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
ijtsrd
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
What's hot
(19)
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
20 74-1-pb
20 74-1-pb
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Fog doc
Fog doc
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
I42024349
I42024349
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
Fs2510501055
Fs2510501055
Paper id 27201433
Paper id 27201433
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
Similar to IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
Gf2511301134
Gf2511301134
IJERA Editor
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
INFOGAIN PUBLICATION
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
50620130101004
50620130101004
IAEME Publication
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Gowthami Konakanchi
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
C04932125
C04932125
IOSR-JEN
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
IRJET Journal
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
IRJET Journal
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
cscpconf
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
Similar to IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing
(20)
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Gf2511301134
Gf2511301134
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
50620130101004
50620130101004
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
C04932125
C04932125
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Recently uploaded
(20)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7947 A LIGHTWEIGHT PROTECTED DATA SHARING METHOD FOR MOBILE CLOUD COMPUTING Suganaya. S1 and Dr. S. Chandrasekaran2 suganyasundharesan@gmail.com and chandrudpi@gmail.com 1PG Student and 2Assistant Professor, Department of Computer Science and Engineering P.S.V. College of Engineering & Technology, Krishnagiri ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the popularity of distributed computing, cell phones can store/recover individual information from anyplace whenever. Subsequently, the information security issue in portable cloud turns out to be increasinglyseriousand forestalls further advancement of versatile cloud. There are significant examinations that have been led to improve the cloud security. Nonetheless, the vast majority of them are not material for portable cloud since cell phones just have restricted registering assets and power. Arrangements with low computational overhead are in incredible requirement for portable cloud applications. In this paper, we propose a lightweight information sharing plan (LDSS) for portable distributed computing. It embraces CP-ABE, an entrance control innovation utilized in typical cloud condition, yet changes the structure of access control tree to make it appropriate for portable cloud situations. LDSS moves an expansive segment of the computational serious access control tree change in CP-ABE from cell phones to outer intermediary servers. Besides, to lessen the client denial cost, it acquaints trait portrayal fields with actualize sluggish repudiation, which is a prickly issue in program based CP-ABE frameworks. The exploratory outcomes demonstrate that LDSS can successfully lessen the overhead on thecell phonesidewhenclientsaresharing information inversatile cloud situations. Key Words: mobile cloud computing, data encryption, access control, user revocation. 1. INTRODUCTION The development of cloud computing and the popularity of smart mobile devices, peoplearegraduallygettingaccustomedtoa new era of data sharing model in which the data is stored on the cloud and the mobile devices are used to store/retrieve the data from the cloud. Typically, mobile devices only have limitedstoragespaceandcomputing power.Onthecontrary,thecloud has enormous amount of resources. In such a scenario, to achieve the satisfactory performance, it is essential to use the resources provided by the cloud service provider (CSP) to store and share the data. Nowadays, various cloud mobile applications have been widely used. In these applications, people (data owners) can upload their photos, videos, documents and other files to the cloud and share these data with other people (data users) they like to share. CSPs also provide data management functionality for data owners. The state-of-the-art privilege management/accesscontrol mechanismsprovidedbytheCSPareeither notsufficientornotvery convenient. First, when people upload their data files onto the cloud, they are leaving the data in a place where is out of their control, and the CSP may spy on user data for its commercial interests and/or other reasons. Second, people have to send password to each data user if they only want to share the encrypted data with certain users, which is very cumbersome. To simplify the privilege management, we propose a Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing environment. The main contributions of LDSS are as follows: (1) We design an algorithm called LDSS-CP-ABE based on Attribute-Based Encryption (ABE) method to offer efficient access control over ciphertext. (2) We use proxy servers for encryption and decryption operations. In our approach, computational intensive operations in ABE are conducted on proxy servers, which greatly reduce the computational overhead on client side mobile devices.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7948 Meanwhile, in LDSS-CP-ABE, in order to maintain data privacy, a version attribute is also added to the access structure. The decryption key format is modified so that it can be sent to the proxy servers in a secure way. (3) We introduce lazy re-encryption and description field of attributes to reduce the revocation overhead when dealing with the user revocation problem. (4) Finally, we implement a data sharing prototype framework based on LDSS. The experiments show that LDSS can greatly reduce the overhead on the client side, which only introduces a minimal additional cost on the serverside.Suchanapproach is beneficial to implement a realistic data sharing security scheme on mobile devices. The results also show that LDSS hasbetter performance compared to the existing ABE based access control schemes overciphertext.Therestofthispaperisorganizedas follows. Section 2 presents some fundamental concepts in secure mobileclouddata sharingandthesecuritypremise.Section3 gives the detailed design of LDSS. Section 4 and 5 give the safety assessment and performanceevaluation,respectively.Section 6 presents related works. Finally, Section 7 concludes our work with the future work. 2 PRELIMINARIES AND ASSUMPTIONS In this section, we first briefly present the technique preliminaries closely related to LDSS, and then present thesystemmodel and some security assumptions in LDSS. 2.1 Preliminary Techniques 2.1.1 Bilinear Pairing In our implementation, we usually take as a group consisting points on an elliptic curve, as a multiplicativesubgroupofa finite field, e as a Weil or the Tate pairing based on an elliptic curve over a finite field. Further descriptions on how theseparameters are defined and generated can be found in [28]. 0 G 1 G 2.1.2 Attribute-Based Encryption Attribute-based encryption (ABE) is proposed by Sahai and Waters [29].ItisderivedfromtheIdentity-BasedEncryption(IBE) and is particularly suitable for one-tomany data sharing scenarios in a distributed and open cloud environment. In real applications, CP-ABE is more suitable since it resembles role-based access control. In CP-ABE, the data owner designs the access control policy and assigns attributes to data users. A usercandecryptthedata properlyiftheuser’sattributessatisfythe access control policy. 2.1.3 Secret Sharing Scheme Shamir secret sharing scheme is used to protect secret information. 2.2 Security Assumptions 2.2.1 Semi-trusted Server LDSS is designed under the same assumptions proposed in 0 that the CSP is honest but curious, which means that the CSP will faithfully execute the operations requested by users, but it will peek on what users have stored in the cloud. The CSP will faithfully store users’ data, undertake an initial access control, update data according to users’ requests. However, CSPmay do malicious actions such as collusion with users to get the data in plain text. 2.2.2 Trusted Authority In this paper, to make LDSS feasible in practice, a trusted authority (TA)isintroduced.Itisresponsibleofgeneratingpublicand private keys, and distributing attribute keys to users. With this mechanism, users can share and access data without being aware of the encryption and decryption operations.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7949 2.2.3 Lazy Re-encryption In ciphertext access control, data needs to be re-encrypted when some users’ access privileges to the data are revoked. However, frequent re-encryption brings heavy computational overhead,andtheaccessedplaintextdata mayalreadybestored on these data users. Therefore, this paper adopts the lazy re-encryptionmethodproposedin[3].Withlazyre-encryption,when a user’s access privilege is revoked, data is not re-encrypted until the data owner updates the data. 3 OUR PROPOSED MECHANISM In this section, we describe the LDSS system design. First, we give the overview of LDSS, and then we present LDSS-CP-ABE algorithm and system operations, which are the base of LDSS algorithm. Finally, we describe LDSS in details. 3.1 Overview We propose LDSS, a framework of lightweight datasharing scheme in mobile cloud (see Fig. 1). It has the following six components. (1) Data Owner (DO): DO uploads data to the mobile cloud and share it with friends. DO determinestheaccesscontrolpolicies. (2) Data User (DU): DU retrieves data from the mobile cloud. (3) Trust Authority (TA): TA is responsible for generating and distributing attribute keys. (4) Encryption Service Provider (ESP): ESP provides data encryption operations for DO. (5) Decryption Service Provider (DSP): DSP provides data decryption operations for DU. (6) Cloud Service Provider (CSP): CSP stores the data for DO. It faithfully executestheoperationsrequestedbyDO, whileit may peek over data that DO has stored in the cloud. LDSS-CP-ABE Algorithm To better illustrate LDSS-CP-ABE algorithm, we first define the following terms. Definition 1: Attribute An attribute defines the access privilege for a certain data file. Attributes are assigned to data users by data owners. A data user can have multiple attributes corresponding to multiple data files. A data owner can define a set of attributes for its data files. The data accesses are managed by access control policy specified by data owners. Let A = {A1, A2, A3, ..., An} be the set of attributes for a data owner. Each data user u also has a set of attributes Au, which is a non-emptysubset ends, teachers, peers, Hubei, Beijing, Shanghai, degree of intimacy}. Definition 2: Access Control Tree Access control tree isthespecificexpressionof access control policies, in which the leaf nodes are attributes, andnon-leafnodesare relational operatorssuchasand,or,nofm threshold. Each node in an access control tree represents a secret, and the secretofa topnodecanbesplitintomultiple secrets by secret sharing scheme and distribute to lower level nodes described in Definition 1. Definition 3: Version Attribute. Version attribute isintroducedinLDSS-CP-ABE algorithmtoensuresecurity.Itisan additionto the original access control tree, forming a new root node of and. We have the following definitions. T: The new access tree with version attributes. S: The secret related to the root of T. Ta, Ra, Sa: Ta is the initial access control tree and the left subtree of T. Ra is the root of Ta. Sa is the secret related to Ra. Tv, Rv, Sv: Tv is the right subtree of T and contains only one node, which represents the version attribute Rv. Sv is the secret related to Rv. Both Sa and Sv are derived from S based on the secretsharing scheme. For the example described in Definition 1, the access Encryption server provider(ESP) Decryption server provider(DSP).
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7950 Setup(A, V): Generate the master key MK, the public key PK based on attribute set A of the Data Owner and the version attribute V . KeyGen(Au, MK): Generate attribute keys SKu for a data user U based on his attribute set Au and the master key MK. Encryption(K, PK, T): Generate the ciphertext CT based on the symmetric key K, public key PK and access control tree T . Decryption(CT,T,SKu): Decrypt the ciphertext CT using the access control tree T and the attribute keys SKu . We explain all of these functions specifically below. First, function Setup() is called by the trusted third party (TA) to generate the master key and the public key. The master key is used to generate attribute keys and the public key is used to encrypt data files. 3.3 Attribute Description Field in LDSS-CP-ABE Attribute description field is introduced in LDSS for dynamic user privilege management. It keeps access control strategy secret against the cloud. 3.4.1 System Initialization In system initialization, Function 1 is executed. The specific process is described as follows. (1) When the data owner (DO) registers on TA, TA runs the algorithm Setup() to generatea publickeyPKanda masterkeyMK. PK is sent to DO while MK is kept on TA itself. (2) DO defines its own attribute set and assigns attributes to its contacts. All these information will besenttoTAand thecloud. 3.4.2 File Sharing The process of file sharing uses Function 3 to encrypt data files. The specific process is described as follows. (1) DO selects a file M which is to be uploaded and encrypts it using a symmetric cryptographic mechanism(suchasAES,3DES algorithm) with a symmetric key K, generating ciphertext C. (2) DO assigns access control policy for M and encrypts K with the assistance ofESPusingFunction3,generatingthe ciphertext of K (CT). 3.4.3 User Authorization The process of user authorization executes Function 2 to generate attribute keys for data users. The specific proc ess is described as follows. (1) DU logins onto the system and sends, an authorizationrequesttoTA.Theauthorizationrequestincludesattributekeys(SK) which DU already has. (2) TA accepts the authorization request and checks whether DU has logged on before. If theuserhasn’tloggedon before,go to step (3) , otherwise go to step. 4. SECURITY ANALYSIS The security assessment is based on the security assumptions we described in Section 3. The possiblescenariosthatmalicious users may expose plaintext to others are not discussed. 4.1 Security Analysis of LDSS-CP-ABE LDSS-CP-ABE algorithm is designed on top of Attribute- Based Encryption (ABE). The security of ABE is based on the bilinear diffie-hellman assumptions. 4.2 Data Confidentiality against Conspiracy The data confidentiality is taken into account from two aspects. In LDSS, dataareencrypted witha symmetrickey.Thesecurity of this part is guaranteed by symmetric encryption mechanism. Next, the symmetric key is encrypted by attribute encryption. The security of this part depends on the encryption process. 5 PERFORMANCE EVALUATIONS The cost of data sharing comes from the execution of the function Encryption(), which is executed every time when sharing data files. The function Encryption() includes exponentiation operation on G0 (the numberofoperationsisproportional tothe number of attributes included in the access strategy) and one exponentiation operation on G1.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7951 Fig. 5.1 Computational overhead with different CP-ABES 5.3 Storage Overhead Evaluation We also evaluate the storage overhead of LDSS and compare it with existing CP-ABE schemes. 5.3.1 Storage Overhead with Different CP-ABE Schemes DO needs to keep PK, which is of the size (|A|+3)LG0+ LG1. DU also needs to keep SK, which is of the size (|Au|+4) LG0. TA needs to keep PK and MK. MK is of the size LG0. The cloud needs to keep the symmetric key ciphertext CT, which is of the size (2|Ta|+3) LG0+ LG1. DSP / ESP only do calculations and need not retain any value. 5.4 Communication Overhead Evaluation The communication overhead of access control happens when TA sends keystoDO/DUatthestageofsysteminitializationand user authorization, and DO/DU encrypt/decrypt the symmetric key which is used to encrypt the data files. 6. RELATED WORKS In this section, we focus on the works of ciphertext access control schemes which are closely related to our research. Access control is an important mechanism of data privacy protection to ensure that data can only be acquired by legitimate users. There has been substantial research on the issues of data access control in the cloud, mostly focusing on access control over ciphertext. Typically, the cloud is considered honestand curious.Sensitivedata hastobeencryptedbeforesending tothecloud. User authorization is achieved through key distribution. 7. CONCLUSION AND FUTURE WORK In recent years, many studies on access control in cloud are based on attribute-based encryption algorithm (ABE). However, traditional ABE is not suitable for mobile cloud because it is computationally intensive and mobile devices only have limited resources. In this paper, we propose LDSS to address this issue. It introduces a novel LDSS-CP-ABEalgorithmtomigratemajor computation overhead from mobile devices onto proxy servers, thus it can solve the secure data sharing problem in mobile cloud. REFERENCES [1]. Adam Skillen and Mohammad Mannan. On Implementing Deniable StorageEncryptionforMobileDevices.the 20thAnnual Network and Distributed System Security Symposium (NDSS), Feb. 2013. [2] Wang W, Li Z, Owens R, et al. Secure and efficient access to outsourced data. in: Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago, USA: ACM pp. 55-66, 2009. [3] Maheshwari U, Vingralek R, Shapiro W. How to build a trusted database system onuntrustedstorage.in:Proceedingsofthe 4th conference on Symposium on Operating System Design & Implementation-Volume4.USENIXAssociation, pp. 10-12,2000. [4]Boneh D, Franklin M. Identity-based encryption from the Weilpairing.in:ProceedingsoftheAdvancesinCryptology.Berlin, Heidelberg: Springer-Verlag, pp. 213−229, 2001. Bethencourt BSW CP-ABS Data sharing (2|Ta|+1)T_ G0+T_G1 (4|Ta|+1)T_ G0+T_G1 3T_G0+T_Gm Data access (2|Au|+1)T_Ge (2|Au|+1)T_Ge T_G0+T_Gm
Download now