This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
This is a common fact nowadays to use the external third party resources for data storage and
sharing among multiple personnel of the same organization or different organizations. Such external
resources are collectively known as Cloud Computing resources. Cloud Computing resources save
time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of
using cloud services in many organizations or individuals, there are many concerns resulted. The
major concerns are data sharing, security and efficiency. Since from last 15 years, there are number
of solutions and researches were conducted and applied. Data sharing both single user and multi-user
in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent
cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are
designed for secure data sharing among multiple users. All the recent methods have some limitations
and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security
and their comparative analysis first. At we discussed the research limitations of those methods.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
This is a common fact nowadays to use the external third party resources for data storage and
sharing among multiple personnel of the same organization or different organizations. Such external
resources are collectively known as Cloud Computing resources. Cloud Computing resources save
time, cost and efforts required to manage the huge data of organizations. Due to the rapid growth of
using cloud services in many organizations or individuals, there are many concerns resulted. The
major concerns are data sharing, security and efficiency. Since from last 15 years, there are number
of solutions and researches were conducted and applied. Data sharing both single user and multi-user
in Cloud Computing, and hence it is required that data sharing is strongly secured, number of recent
cryptography base methods such as Identity Based Encryption or Attributed Based Encryption are
designed for secure data sharing among multiple users. All the recent methods have some limitations
and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security
and their comparative analysis first. At we discussed the research limitations of those methods.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
Data contribution in the cloud is a procedure so as to allow users to expediently right of entry information in excess of the cloud. The information holder outsources their data in the cloud due to cost lessening and the huge amenities provided by cloud services. Information holder is not able to manage over their information, since cloud examination contributor is a third party contributor. The main disaster with data partaking in the cloud is the seclusion and safety measures issues. Different techniques are obtainable to sustain user seclusion and protected data sharing. This paper focal point on different schemes to contract by means of protected data partaking such as information contribution with forward security, protected information partaking for energetic groups, quality based information partaking, encrypted data sharing and mutual influence Based Privacy Preserving verification set of rules for right to use manage of outsourced information. S. Nandhini Devi | Mr. S. Rajarajan "A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29345.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29345/a-data-sharing-protocol-to-minimize-security-and-privacy-risks-in-cloud-storage/s-nandhini-devi
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
Cloud computing has developed progressively prevalent for data owners to outsource their data to public cloud servers
while consenting data users to reclaim this data. For isolation disquiets, a secure rifle over encrypted cloud data has stirred numerous
research mechanisms underneath the particular owner model. Conversely, most cloud servers in practice do not just assist one owner,
as an alternative, their sustenance gives multiple owners to share the assistances carried by cloud computing. In this proficient and
confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, new schemes to deal with Privacy preserving
Ranked Multi-keyword Search in a Multi-owner model (PRMSM) has been introduced. To facilitate cloud servers to execute secure
search without knowing the actual data of both keywords and trapdoors, we thoroughly build a novel secure search protocol. To rank
the search results and domain the privacy of relevance scores amongst keywords and files. To thwart the assailants from snooping
secret keys and fantasizing to be legal data users submitting pursuits, a novel dynamic secret key generation protocol and a new data
user authentication protocol is discussed.
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
Cloud computing thrives around trust and security in the relationship between cloud providers and users of their services. The objective was the conduct of a systematic mapping study of cloud computing security, trust and privacy. The research was executed using three classes of facets, namely topic, contribution, and research based on the systematic mapping process. The result shows that privacy issues and challenges on metric had 4.76% of the publications. On cloud trust in the domain of tool, the publications were 8.75%. The publications on design within the domain of model stood at 12.38%, and publications on privacy issues and challenges in the area of process were 8.57%. Furthermore, there were more articles published on privacy issues and challenges within the domain of evaluation research with 10.43%. The publications on design based on validation research made up 7.83% of the study. More papers were also published on frameworks and techniques within the domain of solution research with 5.22% each. There were more articles published on privacy issues and challenges with regards to philosophical research with 4.35%. Shortcomings in the fields of security, trust and privacy in the cloud, were identified through this study, which should motivate further research.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
Data contribution in the cloud is a procedure so as to allow users to expediently right of entry information in excess of the cloud. The information holder outsources their data in the cloud due to cost lessening and the huge amenities provided by cloud services. Information holder is not able to manage over their information, since cloud examination contributor is a third party contributor. The main disaster with data partaking in the cloud is the seclusion and safety measures issues. Different techniques are obtainable to sustain user seclusion and protected data sharing. This paper focal point on different schemes to contract by means of protected data partaking such as information contribution with forward security, protected information partaking for energetic groups, quality based information partaking, encrypted data sharing and mutual influence Based Privacy Preserving verification set of rules for right to use manage of outsourced information. S. Nandhini Devi | Mr. S. Rajarajan "A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29345.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29345/a-data-sharing-protocol-to-minimize-security-and-privacy-risks-in-cloud-storage/s-nandhini-devi
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
Cloud computing has developed progressively prevalent for data owners to outsource their data to public cloud servers
while consenting data users to reclaim this data. For isolation disquiets, a secure rifle over encrypted cloud data has stirred numerous
research mechanisms underneath the particular owner model. Conversely, most cloud servers in practice do not just assist one owner,
as an alternative, their sustenance gives multiple owners to share the assistances carried by cloud computing. In this proficient and
confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, new schemes to deal with Privacy preserving
Ranked Multi-keyword Search in a Multi-owner model (PRMSM) has been introduced. To facilitate cloud servers to execute secure
search without knowing the actual data of both keywords and trapdoors, we thoroughly build a novel secure search protocol. To rank
the search results and domain the privacy of relevance scores amongst keywords and files. To thwart the assailants from snooping
secret keys and fantasizing to be legal data users submitting pursuits, a novel dynamic secret key generation protocol and a new data
user authentication protocol is discussed.
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
Cloud computing thrives around trust and security in the relationship between cloud providers and users of their services. The objective was the conduct of a systematic mapping study of cloud computing security, trust and privacy. The research was executed using three classes of facets, namely topic, contribution, and research based on the systematic mapping process. The result shows that privacy issues and challenges on metric had 4.76% of the publications. On cloud trust in the domain of tool, the publications were 8.75%. The publications on design within the domain of model stood at 12.38%, and publications on privacy issues and challenges in the area of process were 8.57%. Furthermore, there were more articles published on privacy issues and challenges within the domain of evaluation research with 10.43%. The publications on design based on validation research made up 7.83% of the study. More papers were also published on frameworks and techniques within the domain of solution research with 5.22% each. There were more articles published on privacy issues and challenges with regards to philosophical research with 4.35%. Shortcomings in the fields of security, trust and privacy in the cloud, were identified through this study, which should motivate further research.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features.
This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity. To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Cloud Data Security and Secure Data Sharing Methods
1. 1
CLOUD DATA SECURITY AND SECURE DATA SHARING METHODS
MUSTAFA SADEQ JAAFAR *
Department of Computer Engineering, Penza State University, Penza, Russia.
This is a common fact nowadays to use the external third party resources for data storage and sharing among
multiple personnel of the same organization or different organizations. Such external resources are collectively
known as Cloud Computing resources. Cloud Computing resources save time, cost and efforts required to
manage the huge data of organizations. Due to the rapid growth of using cloud services in many organizations
or individuals, there are many concerns resulted. The major concerns are data sharing, security and efficiency.
Since from last 15 years, there are number of solutions and researches were conducted and applied. Data
sharing both single user and multi-user in Cloud Computing, and hence it is required that data sharing is
strongly secured, number of recent cryptography base methods such as Identity Based Encryption or Attributed
Based Encryption are designed for secure data sharing among multiple users. All the recent methods have some
limitations and advantages. This paper addresses the current research problems of data security and privacy
preserving in cloud servers. The study was presented over different methods of cloud data security and their
comparative analysis first. At we discussed the research limitations of those methods.
Keywords: Cloud Computing, Data Security, Data Sharing, Cryptography, Multi-User Sharing,
Servers, Storage.
1. Introduction
Nowadays, Cloud Computing systems are widely available to use for different
purpose of data storage and sharing in order to save the costs and time. The stored data is
shared among the multiple users in Cloud Computing and this is a very frequent task.
Hence Cloud Computing is a rapidly growing resource service providing framework with
less time and less cost requirements from the last 10-15 years. The services of Cloud
Computing are offering number of benefits to the small and large organizations for their
important data management. Cloud Computing is one of the matchless and having the
new label of the traditional idea. The collections of resources in Cloud Computing
framework are provided by a service provider of the cloud to the end users based on their
demands through the internet. The services of cloud are distributed all over the world.
Cloud Computing creates the virtual environment for its users in which it allows the end
users to use services or resources of the cloud virtually. Due to the number of advantages
from using Cloud Computing framework, it becomes under spotlights in just few years of
span. The common example of cloud services is Amazon AWS cloud services, IBM,
Google etc. Along with the number of benefits from using Cloud Computing services,
there are a number of challenges also such as availability, reliability, and most important
and widely studied research problem is the security. The growing use of cloud services
resulted into a number of security challenges. The absence of effective data security
methods is the main concern in traditional Cloud Computing services and platforms.
*
Typeset names in 8 pt Times Roman, uppercase. Use the footnote to indicate the present or permanent address
of the author.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
263 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. Author’s Names2
In order to provide the data security, a number of techniques introduced since the last
15 years or more. Data security and confidentiality are the main requirements in such
Cloud Computing systems with big data frameworks. Some of these methods are based
on the cryptography approach with the goal of achieving the data security under Cloud
Computing systems. The method of Public Key Encryption (PKE) for example allows
data encryption at the sender’s side by using the public key of the intended receiver of
data with the goal of providing the data security and it should be accessed by legitimate
users only. But the limitation of this approach is that, it failed to address all the
requirements of end users for cloud data security. In a hospital day to day operation in
which the medical information of individual patients is stored into cloud storage systems,
the data stored over the cloud system is in an encrypted form using the PKE approach
with the goal of preventing the invalid access to the patient’s sensitive data by any invalid
user. Therefore, after storing the patient’s data in an encrypted format over the cloud
server, only legitimate users are able to access or having privileges for accessing such
data stored on the cloud server. The recently introduced methods along with the PKE
such as Identity Based Encryption (IBE) as well as the Attribute Based Encryption (ABE)
are all achieving the confidentiality of such medical data efficiently [4] [5]. The IBE
(Identity Based Encryption) is one of the best approaches for Public Key Encryption
which is presented basically for the sake of simplifying the process of key management in
certificate based PKI (Public Key Infrastructure). This can be done by using the human
intelligible parameters such as email address, IP address and unique name etc. as public
keys. After that, the sender who’s using the IBE doesn’t need to look into the public key
& the certificate, just directly encrypting a message with the receiver’s identity. As like
as, the receiver achieves the private key which is allocated with the corresponding
identity from the Private Key Generator (PKG) and it is available for the decryption of
such types of cipher text. Though IBE allows an arbitrary string as the public key which
is considered as an appealing advantage over the PKI, it demands an efficient revocation
mechanism, specifically if there are private keys of many users that got compromised, we
must provide a mean to revoke such users from system. In the PKI setting, revocation
mechanism is to be corrected by the appending validity periods of certificates or by using
some involved combinations of techniques [2] [3] [4]. Nevertheless, the given
cumbersome management of certificates is precisely the burden that the IBE strives to
alleviate. Additionally, the previous techniques based on cryptography which was
proposed for guaranteed personal information confidentiality and multi-user data sharing
are vulnerable to the security threats like data loss and leakage. This is because of the
existing cryptography techniques are not considering the anonymity of the sender or the
receiver cipher texts. Hence it is possible that the novice or invalid user is able to obtain
the information of cipher text. For example, the cloud server which may know the
information of the public key used in the encryption, and hence it might be possible for
the cloud server to obtain the cipher text information with the name of patient related to
that cipher text. Similarly, the recipient of the cipher text may be identified from the
available cipher text without any trouble so this is one more serious reason behind the
achieving of patient’s data privacy [6].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
264 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. Instructions for Typing Manuscripts (Paper’s Title) 3
In this paper, the motivation is to analyse all the recent cloud data security methods
presented for achieving privacy preservation, secure multi-user data sharing and etc.
Their frameworks and methodology were discussed. In section II, the different challenges
and concerns of the cloud data security are presented. In section III, studies on all the
existing techniques for achieving the cloud data security were also discussed. In section
IV, the comparative analyses of the discussed methods are presented along with the
research problems. Finally the conclusion and future work of this paper is presented.
2. Cloud security concerns
There are a number of security issues related to Cloud Computing frameworks for
data storage. During this section, various security challenges are discussed.
Fig.1. Different Security Issues in the Cloud Data Storage
Below listed are the main cloud security issues which are addressed by the cloud
service providers while applying and delivering the cloud services to end users.
1. Privacy Preserving: Store the individual private/personal infrmation this only access
the authorized person that person only rights.The privacy in Cloud Computing
framework this is based on the cloud deployment model.To the reduction of cost the
advantages of public cloud is one of the promising architectures. However this public
cloud is relying over the cloud service provider in order to manage as well as to keep end
users information safe and secured which leads to a number of privacy related issues such
as:
• Unauthorized Secondary Usage: The placing the data to legitimate and
authorized secondary uses the data will be secure and profit.For the scondary
uses no any technical barriers at the present.
• Trans border Dataflow and Data Proliferation: Data proliferation is an
attribute of Cloud Computing systems which is composed of a number of
companies and hence not managed as well as not controlled by individual
data owners.Easy to use the copying the data over many data centers
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
265 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. Author’s Names4
gurantees. The main challenging point is backup of data or its duplicate copy
is not saved or processed with a specific authority.
• Lack of User Control: Whenever in cloud comuting frameworks,
processing and sharing of user’s important infromation is not having more
control which leadsto face some threats like theft, missuse or illegal access.
• Dynamic Provision: The nature of the cloud is vibrant therefore it is not so
clear that who is responsible legally in order to ensure the sensitive data
privacy which is stored by end users on a cloud server.
2. Security of the Cloud Data: In the cloud computing public clouds are not only
increasing the security concerns but also increasing the issues of privacy. Below listed are
some of the common security concerns for public clouds:
• Access: In the cloud securiy is one of the threats of accessing the personal
and private information.It might be possible that any attacker can try to
access others’ personal information.
• Availability and Backup: In this environment no guaranty for the
existenece & back up of the data. The Business backup is one of the
important considerations.
• Multi-Tenancy: In this one program can be run onto many machines using
the feature of SAAS (Software as a Service). CSP (Cloud Service Provider)
wheneve we use the multi-tenant application of the cloud that time decease
the cost of use the virtual machines but in this time increase the risk of
vulnerability.
• Data Lifecycle Control: On the data customer which havaing control, if he
or she was removed or deleted then the data vendor cannot regain control
over the data.
• Auditing: Implemeting the internal monitoringcontrol CSP (Cloud Service
Provider) is requiring the external auditing mechanism. But still the cloud
fails to give an auditing for transactions without affecting the data integrity.
3. Trust: Trust is most important or required to every organization to the incresing the
profits by using the clooud services. However, the cloud has failed to achieve the trust
between the end user and the cloud service provider, hence a vendor uses this marvelous
application that should make trust available but in reality there is a weak relationship
from the customer side towards the service provider & the customer trust issues that
appears because of many problems during the deployment of the cloud services.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
266 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. Instructions for Typing Manuscripts (Paper’s Title) 5
3. Related work
In this section, recent methods for achieving the cloud security are discussed those
which were presented from 2013 onwards.
Xuefeng Liu et.al (2013)
In [1], The MONA method is designed for the clod data sharing. MONA was
designed for dynamic groups in an un-trusted cloud. Using this approach the user able to
share the data with others in the group without revaling identity privacy to the cloud.This
method supported the efficient user revocation as well as the new user joining
methodology. The efficient user revocation was achieved via a public revocation list
without updating the private keys of the remaining users and the new users were directly
decrypting their files stored on the cloud before their participation. The experimental
results of MONA have shown that the storage overhead and the encryption computation
cost were constants. The system model designed by the authors is shown below in figure
2.
Fig.3. MONA System Model
Zhifeng Xiao et.al (2013)
In [2], using the attribute-driven mehodologythe authors presented the
systematic study of security and privacy issues in cloud computing. They identified the
most representative security/privacy attributes (e.g., confidentiality, integrity, availability,
accountability, and privacy-preservability), as well as discussed the vulnerabilities, which
may be exploited by adversaries in order to perform various attacks. Defence strategies
and suggestions were discussed as well.
Huang Lin et.al (2013)
In [3] additionally, the outsourcing decryption technique and a newly proposed
key for private proxy re-encryption were used to shift the computational complexity of
the involved parties to the cloud without compromising the clients’ privacy and the
service providers’ intellectual property. They solved the security problems by designing
the cloud-assisted privacy preserving mobile health monitoring method in order to protect
the privacy of the involved parties and their data.
Cheng-Kang Chu et.al (2013)
In [4], author used the novel-key cryptosystems for secure data sharing. This
approach produced constant-size cipher texts so that the efficient delegation of the
decryption rights for any set of cipher texts would be possible. Using thid approach
anyone can aggregate any set of secret keys and make them as compact as a single
key,but encompassing the power of all the keys being aggregated.The aggregated
compact key easily transmitted from one place to other or save in smart cards with
minimum storage requirements.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
267 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Author’s Names6
Kaitai Liang et.al (2014)
In this [5], the author defined the notation of DFA (Deterministic Finite Automata)-based
functional proxy re-encryption, and introduced a concrete approach for satisfying this
notion. The author assigned that the scheme, which was the first of its kind, to be
adaptively CCA (chosen-cipher text attacks) secure in the standard model by employing
Lewko et al.’s dual encryption technology [5].
Seung-Hyun Seo et.al (2014)
In [6],this using the (MC-LPKE) method provides the formal security.Usin this
method solved the key escrow problem and the revocation problem.In this using the key
building block,hey proposed an improved share sensitive data in public clouds
securely.Their method supported immediate revocation and assured the confidentiality of
the data stored on an untrusted public cloud while enforcing the access control policies of
the data owner.
JunJie Qiu et.al (2015)
In [7], this Cloud Computing based applications the several of Identity-Based
Proxy Re-Encryption (IBPRE) this is based on security method. This method was based
on CT07 framework introduced earlier. The main purposed to devloped this method is
prevent the collusion of delegation and proxy. This method extends the approach
previously proposed by overcoming its problems related to non-interactivity and uni-
directionality. In this approach the security was achieved by addition of secrete parameter
as well as changing the re-encryption key and the secrete key. The theoretical analysis of
this method was showing the security against the CCA (chosen-cipher text attacks) and
the collusion attack for standard model. The open research problem with this method is
the CS (Cloud Server) and the anonymity.
Baojiang Cui et.al (2015)
In [8], in this author devloped the KASE (key-Aggregate Searchable
Encryption) approach this mehod specially devloped to cloud data security.Whenever use
this approach the owner only needs to distribute a single key to a user when sharing lots
of documents with that user and the user only needs to submit a single trapdoor when he
or she queries over all the documents shared by the same owner. The limitaion of this
apporach is whenever user wants to query over the documents shared by multiple
owners,they must generate multiple trapdoors to the cloud.
Xinyi Huang et.al (2015)
In [9], in this author devloped the new idea known as FSID-BRS (Forward
Secure ID-Based Ring Signature). This approach mainly focus on ID-based ring
signature mehod in order to have forword security.The first literature is ID-based setting.
Their method delivered the unconditional anonymity and can prove the forward-secure
unforgivable in the random oracle model, by considering the fact that RSA (Rivest,
Shamir, Adleman) problem is hard to solve already. Experimentally they had shown that
their approach is very usefull and does not require any pairing operations.
Ximeng Liu et.al (2015)
In [10], this author devloped the efficient privacy preserving outsourced
cmputaion method of usefull to the public data, called EPOC. EPOC enabled the user to
outsource the computation of a function over multi-dimensional public data to the cloud
while protecting the privacy of the function and its output.The author devloped the three
types of EPOC in order to trade-off among various levels of privacy protection and
performance. They presented a novel cryptosystem called Switchable Homomorphism
Encryption with Partial Decryption (SHED) as the core cryptographic primitive for
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
268 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. Instructions for Typing Manuscripts (Paper’s Title) 7
EPOC.The another thing is the author additionally devloped the tw coding techniqes,
called Message Pre-coding and Message Extending and Coding, for the messages
encrypted under a Composite order group. Also they proposed a Secure Exponent
Calculation Protocol with Public Base (SEPB), which serves as the core sub-protocol in
EPOC. The complete system model designed by the author is showing below in figure 3.
Fig.3. System Model Designed in [10]
Mi Wen et.al (2015)
In [11], this introduced the key management approach based on a session key
convergent called SKC in order to secure the dynamic update during the process of data
deduplication. Using this approach,, every data owner verified the session key correctness
as well as changes it dynamically with the data update. They conducted the security
analysis in order to demonstrate both SKC and CKS (convergent key sharing) methods in
terms of their protection for the confidentiality of the data and the convergent key in the
case of the dynamic updates.
Shungan Zhou et.al (2016)
In [12], this author introduced the cloud data security with the goal of security,
scalability and efficient multi-user data sharing. The name of approach is SSEM given by
the author.Using this approach the diffrent data owners are capable of sharing the data in
a pattern of many-to-many.This leads to a conclusion which states that SSEM approach
was suitable for the applications of a group based sharing of data with asymmetric group
key agreement.
4. Analysis and research gap
Based on the study that was conducted on the above mentioned different methods in
this paper, an analysis of all these methods was presented below to point out the current
research gaps. Table 1 is showing the comparative study of several recent methods with
respect to the different security requirements.
Table 1: Comparative Analysis of Some Recent Cloud Security Methods
Ref. No. PA PP SDS SE TP TPS
[1] x x x
[3] x x x x x
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
269 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. Author’s Names8
[4] x x x x
[5] x x x x x
[6] x x x x
[8] x x x x
[9] x x x
[12] x x
Research Limitations and Gaps:
Based on the above study and its observations, the current research challenges are:
- Most of the methods failed to cover public auditing except for the MONA [1].
- Scalability is not evaluated with respect to public auditing.
- Third party scalability is not addressed in all the mentioned methods.
- MONA [1] worked on public auditing, privacy preserving and secure multi-user
data sharing, but scalability is not addressed.
- The other methods designed with limited scopes.
5. Conclusion and future work
In this paper, the introduction of Cloud Computing framework and the necessity of cloud
security methods were presented. Further the different security concerns of Cloud
Computing frameworks were discussed as well. The secondary objective of this paper
was to present a study over most of the recent cloud security methods with different
purposes. The methods from 2013 up to 2016 were all introduced to handle the issues of
privacy preserving, public auditing, secure data sharing, proxy re-encryption, scalability
evaluation and etc. Based on this study the current research problems were marked and
discussed. Finally, the future work of this paper would be working on the current
limitations and gaps of the previously mentioned researches and their methods to address
the proper solutions and to cover the missing points that were mentioned in this paper to
optimize and enhance the efficiency of Cloud Computing frameworks.
References
Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, "Mona: Secure
Multi-Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013
Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing", IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER
2013
PA: Public Auditing, PP: Privacy Preserving, SDS: Secure Data Sharing, SE: Scalability
Evaluation, TP: Third Party, TPS: Third Party Scalability
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
270 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. Instructions for Typing Manuscripts (Paper’s Title) 9
Huang Lin, Jun Shao, Chi Zhang, and Yuguang Fang, "CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring", IEEE TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 8, NO. 6, JUNE 2013
Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, "Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage", IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, 2013.
Kaitai Liang, Man Ho Au, Member, IEEE, Joseph K. Liu, Willy Susilo,"A DFA-Based Functional
Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing", IEEE TRANSACTIONS
ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10, OCTOBER 2014
Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino, "An Efficient Certificateless
Encryption for Secure Data Sharing in Public Clouds", IEEE TRANSACTIONS ON
KNOWLEDGE AND DATA ENGINEERING, 2014
JunJie Qiu, JungBok Jo and HoonJae Lee. Collusion-Resistant Identity-Based Proxy Re-Encryption
without Random Oracles. International Journal of Security and Its Applications Vol.9, No.9
(2015), pp.337-344
Baojiang Cui, Zheli Liu and Lingyu Wang, "Key-
Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage", IEEE
TRANSACTIONS ON COMPUTERS, VOL. 6, NO. 1, JANUARY 2015
Xinyi Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou,
"Cost-Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE
Transactions on Computers, 2015
Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li, "An Efficient Privacy-Preserving
Outsourced Computation over Public Data", IEEE Transactions on Services Computing, 2015.
Mi Wen, Kaoru Ota, He Li, Jingsheng Lei, Chunhua Gu, and Zhou Su, "Secure Data Deduplication
With Reliable Key Management for Dynamic Updates in CPSS", IEEE TRANSACTIONS ON
COMPUTATIONAL SOCIAL SYSTEMS, 2015.
Shungan Zhou, Ruiying Du, Jing Chen, Hua Deng, Jian Shen, Huanguo Zhang, "SSEM: Secure,
Scalable and Efficient Multi-Owner Data Sharing in Clouds", China Communications, August
2016.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
271 https://sites.google.com/site/ijcsis/
ISSN 1947-5500