Submit Search
Upload
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
•
2 likes
•
145 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i11/IRJET-V5I11139.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Recommended
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
R180203114117
R180203114117
IOSR Journals
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET Journal
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Paper id 27201446
Paper id 27201446
IJRAT
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
Fog doc
Fog doc
priyanka reddy
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
More Related Content
What's hot
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
R180203114117
R180203114117
IOSR Journals
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET Journal
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Paper id 27201446
Paper id 27201446
IJRAT
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
Fog doc
Fog doc
priyanka reddy
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
What's hot
(20)
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
R180203114117
R180203114117
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
IJSRED-V2I3P52
IJSRED-V2I3P52
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Paper id 27201446
Paper id 27201446
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
Fog doc
Fog doc
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
Similar to IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Similar to IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
(20)
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Recently uploaded
(20)
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 711 A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Heena Kausar Sharpyade1, Mujamil Dakhani2, SaimaRafat Bhandari3 1,3Student, Dept. of Computer Science and Engineering, Karnataka, India 2Asst. Professor, Dept. of Computer Science and Engineering, Karnataka, India ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - As the increasing usage of the cloud computing has even mobile devices a new scope to retrieve and store the personal data from anywhere at any time. Due to increases in the data it has caused the data security problem over the mobile computing. There are lots of studies that have used to secure the cloud but most of them have the limitation for the mobile devices. The solution should be provided withthelower computational overhead. In this paper, the review on lightweight secure data sharing scheme (LDSS) for mobile cloud computing. For providing the satisfactory performance, it is important to use the resources provided by the cloud service provider (CSP) to store and share the data. Key Words: Cloud computing, Data Security, LDSS, CSP. 1. INTRODUCTION With increasing of the cloud storage and more usage of mobile has increased the data sharing model which have been used for the data retroviral and storage. Astheusage of cloud have been increased widely, due to limitation of mobile storage. The cloud have more amount of storage and resources which is provide by the cloud service provider to store and share the data. The cloud mobile applicationssuch as upload of photos, videos, documents and other files tothe cloud and these files can be used to share with other users. Management functionality is also provided by the cloud service provider, but the personal information is important and it should be not shared in publically. It is important to provide the data privacy and the data security which is the major concern. The control mechanism provided by the cloud service provider is not sufficient as it does not meet the requirement of the data owner, the first and far most problem is whenever the user uploadsthefilesoncloudthen the cloud service provider may spy on the file for its use which cause the privacy problem later the user want tosend the password for the encrypted files to unlock it. To overcome these problem data owner have to divide the data user into different user according to the user who want to share their password to the particular group. Password management is a great issue for the security. 2. PROBLEM DEFINITION 2.1 Problem Statement To provide security in lightweight manner resource mobile devices in cloud environment To have light weight revocation policy. The encrypted and decrypted data should be secure using secret key. The sharing of the file should be among the authorized users who have the access privileges. There should also have the opportunity to decrease the overhead of the cryptographic standard algorithm and research the security schemes with low over head. 2.2 Proposed System The proposed system is a Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing environment. The main contributions of LDSS are as follows: It uses the designed algorithm called LDSS-CP-ABE based Attribute-based Encryption (AES) usedforaccess control over ciphertext efficiently. Here the proxy servers are used for encryption and decryption methods. ABE is used for the computational intensive operations for conducting on the proxy servers, which help in reducing the computational overhead on the client side of the mobile devices. There is also maintaining of the data privacy using LDSS-CP- ABE. The modified version of decryption key is sent in secure manner to the proxy servers. To deal with user’s revocation problem the lazy re- encryption and decryption field of attributes are introduced Lastly, to have a data sharing framework prototype based on LDSS. Advantages of proposed system: LDSS has reduces the over head at the client side due which it has reduce the additional costattheserverside. These approaches have increased the security of the data sharing on mobile devices. LDSS has the better performances results based on access control schemes over ciphertext compared to exiting ABE. The overhead is reduced when the multiple revocation operations are merged as one. The data storage overhead is small. 3. LITERATURE SURVEY To study and analyze more about lightweight secure data sharing scheme (LDSS) for mobile cloud computing, the following literature survey has been done.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 712 In [1] the author present an efficient fully homomorphic encryption scheme that is based on the standard learning with errors(LWE)assumption. Byapplyingtheresultswhich are been known on learning with errors, here the worst case been used for the security hardness problems of the short vector. Here the improvement is done onthepreviousworks on two aspects firstly the previous complexity assumption scheme related to deals in various rings are replaced by the homomorphic encryption based on learningwitherrorusing a new re- linearization technique. And secondly the squashing paradigm is introduced based on previous works. There is also new dimensionmodulus reductiontechniqueto reduces decryption complexity. In [2] authors presents the data leakage mitigation for discretionary access control in collaboration cloud. The systems to Software as a Service (SaaS) applications is been collaborated as the usage of the cloud computing has increased.SaaScollaborationhasmorenumberofadvantages but it has some security issues. As the SaaS collaboration is increased there is chance of leakage of the information while sharing to the intruders. There is proposing to mitigate the data leakage problem in SaaS collaboration systems by reducing human errors. There can be series of mechanismto reduces the leakage of the data by allowing the entropies to encodes their organisational security rules mandatory to access the sharing decisions, by prioritizing the potential recipients of the users files to reduces the error and to examines the abnormal recipients. In [3] the authors speak about the implementing deniable storage encryption for mobile devices. Data confidentialityis the one of the most important accept and it can use by encryption. As providing encryption will cover the user information and by using the keys. The data is been hidden so that it cannot be read by the intruders. To solve specific problems, by using Steganographic techniques and deniable encryptionalgorithms. Afterevaluatingexistinganddiscover new, there are some challenges that are comprised plausibly deniable encryption (PDE) in mobile environment. To solve these problems a new system is been designed called Mobiflage that enables PDE on mobile devices for hiding encrypted volumes for the external storage. In [4] authors present a secure and efficient access to outsourced data in. The main aspect is to provide security and efficient access to large scale outsourced data. Here the new mechanism to solve the problem of owner-write-users- read application is introduced. To efficiently achieve the flexible cryptography based access control is done by using encryption to every block ofdata by using different keys. But to use the key derivation methods the owner needs to have somesecrets.Usinghashfunctionsforanalysiskeyderivation will reduces the computational overhead. And also getting the access to updated data blocks can be done by using over encryption and/or lazy revocation. In [5] the authors present the attribute base fine grained access control with efficient revocation in cloud storage system. Here the users are allowed to store the data to the cloud and also provides for data to be used in the cloud storage. As the cloud server and the data owners are not in the sametrust domain, so there cannot be semi trustedcloud server to rely on the access policy. To solve the challenges, traditional methods are been used where the data is been encrypted and send with the decryption keys to authorised users. This traditional method has the high overhead and complicated key management. Toovercomethesechallenges a new design is used to access control framework for the cloud storage systems by Ciphertext-policy Attribute- based Encryption(CP-ABE) approach. 4. METHODOLOGY The LDSS framework for lightweight data sharing schemein mobile cloud is shown in Fig. 4.1. It has the following three components: Data Owner (DO): Data Owner is usedtouploadthedata to the mobile cloud and share it with other users. DO determine the access control policies. Data User (DU): Data User is used to retrieves data from the mobile cloud. Trust Authority (TA): Trust Authority is responsible for generating and distributing attribute keys. As shown in Fig. 4.1, a Data Owner sends data to the cloud. Since the cloud is not trustworthy, so data has to be encrypted before it is uploaded. The Data Owner access the control tree on the data files to assign whichattributesadata user to obtain the certain data files though access control policy. The data files in the LDSS are encrypted in the symmetric order and the symmetric keys of the data encryption is done using Attribute Based Encryption(ABE). The symmetric key, access control policy is embedded with ciphertext. The data user who has authority can access control policy which is encrypted these can bedecryptedand the symmetric key can be retrieve. Fig -4.1: A lightweight data-sharing scheme (LDSS) framework 5. RESULT AND CONCLUSIONS It uses the LDSS which provide the data privacy in the mobile cloud and also reduces the overhead of mobile cloud on user’s side. It has the login page for the data user, data owner and the trust authority as shown in Fig 2. There are the registration forms for the data owner and the data user as shown in Fig 3. There is home page for data user, data owner and trust authority as shown in Fig 4. Depending on particular user the following page pop up as shown in Fig 5.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 713 In data owner the file is uploaded and sends for the encryption as shown in Fig 6 and 7. Then it is send to the cloud for upload of the file as shown in Fig 8. Later the uploaded files can be seen in the data owner page as shown in Fig 9. On clicking view cloud files and verifies attributesin data user page as shown in Fig 10. Then on clicking on decryption as shown in Fig 11, the file can be downloaded as shown in Fig 12. Verify user attributes is checked on trust authority page as shown in Fig 13. The view owner in trust authority page is shown in the Fig 14. Fig -2: Login page for Data User, Data Owner and Trust Authority Fig -3: Signup Page for data user and data owner Fig -4: Home page Fig -5: File uploads in Data owner Fig -6: After clicking on send files for encryption in data owner page Fig -7: After Clicking on upload files to Cloud in data owner page Fig -8: After clicking on uploaded files in data owner page Fig -9: After clicking on view cloud files and verify attributes in data user page Fig -10: After clicking on decrypt file in data user page
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 714 Fig -11: Once we click decrypt file button from the list in data user page Fig -12: Clicking on download link in data user page Fig -13: After clicking on verify user attributes in trust authority page Fig -14: After clicking on view owner in trust authority page REFERENCES [1] Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. in: Proceeding of IEEE Symposium on Foundations of Computer Science. California, USA: IEEE press, pp. 97- 106, Oct. 2011. [2] Qihua Wang, Hongxia Jin. "Data leakage mitigation for discertionary accesscontrol incollaborationclouds".the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), pp.103-122, Jun. 2011. [3] Adam Skillen and Mohammad Mannan. On Implementing Deniable Storage Encryption for Mobile Devices. the 20th Annual Network and Distributed System Security Symposium (NDSS), Feb. 2013. [4] Wang W, Li Z, Owens R, et al. Secure and efficient access to outsourced data. in: Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago, USA: ACM pp. 55-66, 2009. [5] Junzuo Lai, Robert H. Deng ,Yingjiu Li ,et al. Fully secure key-policy attribute-based encryption with constant- size ciphertexts and fast decryption. In: Proceedings of the 9th ACM symposium on Information, Computer and Communications Security (ASIACCS), pp. 239-248, Jun. 2014. [6] Gentry C, Halevi S. Implementing gentry’s fully- homomorphic encryption scheme. in: Advances in Cryptology–EUROCRYPT 2011. Berlin, Heidelberg: Springer press, pp. 129-148, 2011. [7] Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang: Enabling efficient access control with dynamic policy updating for big data in the cloud. INFOCOM 2014, pp.2013-2021, 2014. [8] Benjamin Livshits, JaeyeonJung.AutomaticMediationof Privacy-Sensitive Resource Access in Smartphone Applications. USENIX Security, pp.113-130, Aug. 2013. [9] Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie: DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. IEEE Transactions onInformation ForensicsandSecurity,Vol. 8, No. 11, pp.1790-1801, 2013.
Download now