Submit Search
Upload
IJSRED-V2I3P52
•
0 likes
•
14 views
IJSRED
Follow
International Journal of Scientific Research and Engineering Development
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
J018145862
J018145862
IOSR Journals
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
B04010610
B04010610
IJMER
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
Attribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
Recommended
J018145862
J018145862
IOSR Journals
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
B04010610
B04010610
IJMER
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
Attribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IJTET Journal
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
V5 i7 0169
V5 i7 0169
Siddhartha Bashetty
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IJTET Journal
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
theijes
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
Paper2
Paper2
Vikas Khairnar
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
More Related Content
What's hot
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IJTET Journal
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
V5 i7 0169
V5 i7 0169
Siddhartha Bashetty
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IJTET Journal
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
theijes
What's hot
(18)
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
V5 i7 0169
V5 i7 0169
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
Similar to IJSRED-V2I3P52
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
Paper2
Paper2
Vikas Khairnar
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
Similar to IJSRED-V2I3P52
(19)
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Paper2
Paper2
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
IJSRED-V2I2P10
IJSRED-V2I2P10
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
More from IJSRED
IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
School Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
Growth Path Followed by France
Growth Path Followed by France
IJSRED
Acquisition System
Acquisition System
IJSRED
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
Smart shopping cart
Smart shopping cart
IJSRED
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
Smart Canteen Management
Smart Canteen Management
IJSRED
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
Farmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
More from IJSRED
(20)
IJSRED-V3I6P13
IJSRED-V3I6P13
School Bus Tracking and Security System
School Bus Tracking and Security System
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
Growth Path Followed by France
Growth Path Followed by France
Acquisition System
Acquisition System
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
Smart shopping cart
Smart shopping cart
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
Smart Canteen Management
Smart Canteen Management
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
Farmer's Analytical assistant
Farmer's Analytical assistant
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Recently uploaded
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
IJSRED-V2I3P52
1.
International Journal of
Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 452 A Survey on Secure Data Accessing and Sharing Using Cryptographic Algorithms in Cloud Computing Environment J. Mala*, Dr.A.N. Jayanthi** , S. Rajesh*** * (Information Technology, Sri Ramakrishna Institute of Technology, Coimbatore) ** (Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Coimbatore) *** (Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore) Abstract Data sharing in the cloud is a method that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to cost reduction and the great accessibilities provided by cloud services. Data owner is not able to control over their data, because cloud service provider is a third party user. The major problem with data sharing and accessing in the cloud is the privacy and security issues. Various Cryptographic techniques are available to maintain user privacy and secure data sharing. This paper is mainly focus on several encryption methods to deal with secure data sharing and accessing in the cloud computing environment. Keywords - Cloud, data sharing, access control, security, privacy, encryption I. INTRODUCTION Cloud computing can be used to enable data sharing capabilities and this can provide several benefits to the user and organization when the data shared in cloud. Since many users can contribute their data to the Cloud, the time and cost will be less compared to manually exchange of data.Persons love to share their information with others such as family, colleagues, friends or the world. Scholars also get benefit when working on team projects, as they are able to team up with members and get work done efficiently. This allows higher productivity compared to previous methods of frequently sending updated versions of a document to members of the group via email attachments. II. SECURITY REQUIREMENTS The security requirements for data sharing in cloud computing system are as follows: 1. Data security The provider must ensure that their data outsourced to the cloud is secure and the provider has to take security measures to protect their information in cloud. 2. Privacy The provider must ensure that all critical data are encrypted and that only authorized users have access to data in its entirety. 3. Data confidentiality The cloud users want to make sure that their data contents are not made available to unauthorised users. Only authorized users can access the sensitive data while others should not access any information of the data in cloud. 4. Fine-grained access control Data owner can restrict the unauthorized users to access the data outsource to cloud. The data owner grants different access rights to a set of user to access the data, while others not allowed to access without permissions. The access permission should be controlled only by the owner in un-trusted cloud environments. 5. User revocation When a user gets back the access rights to the data, it will not allow any other user to access the data at the given time. The user revocation must not affect the other authorised users in the group. 6. Scalability The number of users is extremely large in cloud. Also the users join and leave unpredictably from the cloud, it is important that the system maintain efficiency as well as scalability. III. LITERATURE SURVEY Some of the encryption techniques are discussed and summarized as follows. A. Attribute Based Encryption (ABE): Saravana Kumar Na et.al [3] proposed an Attribute Based Encryption(ABE) scheme. Encryption means conversion of original data into human unreadable form. Decryption means conversion of the encoded form into original form. By encrypting the data, the authorized person only can decode the original data. Thus data confidentiality is achieved by the encryption. There are many encryption algorithms today and has its many RESEARCH ARTICLE OPEN ACCESS
2.
International Journal of
Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 453 advantages. The attribute based encryption is a verified algorithm for cloud computing environment. The restrictions of some of attribute based encryption method are to be analysed. Encryption in attribute based encryption is easy, secure and inexpensive compared to other encryption algorithm. The ABE is secure because the encrypted data contains the attributes rather than the data The limitation of the attribute based encryption is decryption of data is expensive [2]. The attribute based encryption makes the application to be secure the performance of the ABE is high compared to other encryption methods. Thus attribute based encryption is the solution to all cloud applications in future. The cloud is moved to next generation computing with critical applications and real time applications. B. Key Policy Attribute Based Encryption(KP-ABE): A. Sahai, and B. Waters et.al [5] proposed a key- policy attribute-based encryption (KP-ABE) scheme. It is the revised form of usual model of ABE. In KP-ABE technique, attribute policies are associated with keys and data is associated with attributes. The keys are associated with the policy which is to be satisfied by the attributes that are associating the decrypted data. Key Policy Attribute Based Encryption (KP-ABE) scheme is a public key encryption technique that is considered for one-to- many communications. Here, the data is associated with the attributes for which a public key is defined for each data. Encryptor, that is who encrypts the data, is associated with the set of attributes to the data or message by encrypting it with a public key. Users are allotted with an access tree structure over the data attributes. The nodes and structure of the access tree are threshold entries. The leaf nodes are associated with attributes. The user secret key is defined to reflect the access tree structure. Hence, the user is able to decrypt the message that is a cipher text if and only if the data attributes satisfy the access tree structure. In KP-ABE, a set of attributes is associated with cipher text and the user’s decryption key is associated with a monotonic access tree structure [6]. When the attributes associated with the cipher text satisfy the access tree structure, then the user can decrypt the cipher text. In cloud computing, an efficient revocation and an access control mechanism on KP-ABE and a re- encryption techniques are used together. It enables a data owner to reduce the server computational overhead. The KP-ABE scheme provides fine-grained access control. Each message is encrypted with a symmetric data encryption key, which is yet again encrypted by a public key, that is corresponding to a set of attributes in KP- ABE, which is created corresponding to an access tree structure. The encrypted data files are stored with the corresponding attributes and the encrypted DEK. If and only if the corresponding attributes of a files are stored in the cloud fulfil the access structure of a user’s key, then the user is able to decrypt the encrypted data encryption key [5]. That can be used to decrypt the file or message. KP-ABE scheme consists of the following four algorithms: 1. Setup: This algorithm takes as input a security parameter κ and returns the public key PK and a system master secret key MSK.PK is used by message senders for encryption. SK is used to generate user secret keys and is known only to the authority. 2. Encryption: This algorithm takes a message M, the public key PK, and a set of attributes as input. It outputs the cipher text E. 3. Key Generation: This algorithm takes as input an access structure T and the master secret key MSK. It outputs a secret key SK1 that enables the user to decrypt a message encrypted under a set of attributes if and only if matches T. 4. Decryption: It takes as input the user’s secret key SK1 for access structure T and the cipher text E, which was encrypted under the attribute set. This algorithm outputs the message M if and only if the attribute set satisfies the user’s access structure T. C. Identity-Based Encryption (IBE): Xinyi Huang et.al [7] proposed an Identity-based (ID-based) ring signature, which eliminates the process of certificate verification. By giving forward secure ID-based ring signature method security level of ring signature is highly increased. In this encryption method, if the secret key of any user has been compromised, previous generated signatures of all is included and the user still remains valid. If a secret key of single user has been compromised it is impossible to ask all data owners to re- authenticate their data. It is particularly important to any large scale data sharing system and it is very effective and does not require any pairing operations. The user secret key is one, while the key update process requires an exponentiation. This scheme is useful specially to those require authentication and user privacy. D. Proxy Re-encryption: Proxy Re-encryption is one more technique that supports secure data sharing and confidential data sharing in the Cloud. Proxy Re-encryption allows a semi-trusted proxy with a re-encryption key to convert a cipher-text under the data owner’s public key into another cipher-text that can be decrypted by other user’s secret key. A user, Alice, encrypts her data using her public key. Alice sends the encrypted data to a proxy, when she wants to share her data with another user, say Bob. The proxy then converts the data encrypted under Alice’s public key into data that is encrypted under Bob’s public
3.
International Journal of
Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 454 key and sends this to Bob. Bob is able to use his private key to decrypt the cipher-text and reveal the data. E. Cipher Text-Policy Attribute Based Encryption(CP-ABE): Sphurti Atram,et al [4] introduced the concept of modified form of Attribute Based Encryption called Cipher text Policy Attribute Based Encryption. In this method, attribute policies are connected with data, which are associated with the keys and only those keys that the associated attributes satisfy the policy associated with the data which are able to decrypt the data. CP-ABE works in the inverse way of KP-ABE. In this method, the cipher text is associated with an access tree structure and each user secret key is embedded with a set of attributes. Key Policy and Cipher text policy based Encryption are the two different methods of attribute based encryption. The authority user can run the algorithm Setup and Key Generation to generate system SK, PK, and user secret keys. Only authorized users are able to decrypt by calling the algorithm Decryption. Here, each user is associated with a set of attributes. The users secret key is generated based on their attributes. While encrypting a message, the encrypter specifies the threshold access structure for their attracted attributes. This message is then encrypted based on this access structure such that only those whose attributes satisfy the access structure can decrypt it. With CP-ABE technique, encrypted data can be kept confidential and secure against collision attacks [4]. Cipher text policy based Attribute Based Encryption scheme consists of following four algorithms: 1. Setup: This algorithm takes as input a security parameter k and returns the public key PK as well as a system master secret key MSK. PK is used by message senders for encryption. SK is used to generate user secret keys and is known only to the authority. 2. Encrypt: This algorithm gets as input the public parameter PK, a message M, and an access structure T. It gives output as the cipher text CT. 3. Key-Gen: This algorithm takes as input a set of attributes associated with the user and the master secret key MSK. It outputs a secret key SK that enables the user to decrypt a message encrypted under an access tree structure T if and only if matches T. 4. Decrypt: This algorithm takes as input the cipher text CT and a secret key SK for an attributes set. It gives the message M if and only if satisfies the access structure associated with the cipher text CT. In CP-ABE depends how attributes and policy are associated with cipher texts and users‟ decryption keys. In a CP-ABE scheme, a cipher text is associated with a monotonic tree access structure and a user’s decryption key is associated with set of attributes. In this scheme, the roles of cipher text and decryption keys are switched as that in KP-ABE. F. Multi-Party Searchable Encryption(MPSE): Qiang Tang et.al [8] suggested a searchable encryption namely multi-party searchable encryption (MPSE). It enables users to selectively permit each other to search in their encrypted data. He proposed a new scheme with provable security. A security model for MPSE provides stronger security guarantee than that from [9]. In the construction of MPSE, authorization is permitted on index level, for each of her indexes. Example Alice can make a decision whether Bob can search or not that is if all keywords try by authorized Bob then Alice supports authorize Bob to look for a subset of keywords in her indexes and also colluded with Bob can recover the keyword in all Alice’s search queries. In this method, Alice can find out a problem of single trapdoor search for all indexes that have been authorized by her. IV. CONCLUSIONS In this paper we have overviewed different encryption schemes that can be used in cloud computing systems are flexible, scalable and fine grained access control. The main issue with data sharing in the cloud is the privacy and security. Various encryption techniques are discussed in this paper to support privacy and secure data sharing such as Data sharing and accessing through cloud. In ABE scheme, there are both the ‘secret key’ and ‘cipher text’ are associated with a set of attributes. ABE is again changed into KP-ABE that provides fine grained access control. In Key policy attribute based encryption, attribute policies are associated with keys and also the data is associated with the attributes. The Keys are associated with the policy that is satisfied by the attributes can decrypt the data. The CP-ABE scheme differs from KP- ABE in such a way that in CP-ABE, cipher text is associated with an access tree structure and each user secret key is embedded with a set of attributes. Attribute policies are associated with data and attributes which are again associated with keys and only those keys that the associated attributes satisfy the policy associated with the data are able to decrypt the users data. REFERENCES [1] Junzuo Lai,Deng, R.H, Chaowen Guan, Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption “,Information Forensics and Security, IEEE Transactions on , vol.8, no.8,Aug. 2013, pp.1343,1354. [2] Mohit Marwaha1, Rajeev Bedi, “Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing”, International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.
4.
International Journal of
Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 455 [3] Saravana Kumar Na, Rajya Lakshmi G.Vb, Balamurugan Ba,” Enhanced Attribute Based Encryption for Cloud Computing,” International Conference on Information and Communication Technologies, Procedia Computer Science Vol.46, 2015, 689 – 696. [4] Sphurti Atram, N. R. Borkar,” A Review Paper on Attribute-Based Encryption Scheme in Cloud Computing,” International Journal of Computer Science and Mobile Computing, Vol. 6, Issue. 5, May 2017,260 – 266. [5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data,” In Proc. of CCS’06, Alexandria, Virginia, USA, 2006. [6] R.Ostrovsky, A. Sahai, and B. Waters, “Attribute- based encryption with non-monotonic access structures,” In Proc. of CCS’06, New York, NY, 2007. [7] Xinyi Huang, Joseph K. Liu, Shaohua Tang, IEEE, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security,” IEEE Transactions On Computers, Vol. 64, No. 4, April 2015. [8] Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions On Parallel and Distributed Systems, Vol. 24, No. 6, June 2013. [9] Kaiping Xue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” Citation information: DOI 10.1109/TCC.2014.2366152, IEEE Transactions on Cloud Computing.
Download now