A PROTECTED OPPOSING-AGREEMENT INFORMATION DISTRIBUTION DESIGN FOR ACTIVE GROUPS IN THE CLOUD
Abstract
In cloud-computing services, cloud providers present generalization of unlimited safe-keeping for clients for hosting data. It can help clients to reduce their financial transparency of understanding managements by means of moving local management structure into cloud servers. It's complicated to recommend a protected and ingenious data discussing system, created for active groups within the cloud. For fliers and card printing, safety of key distribution draws on protected communication funnel, however, to own such funnel is tough supposition that's tricky for practice. The revoked users cannot be capable of obtain original documents after they are revoked once they conspire with untrustworthy cloud. Our physiques is capable of doing limited user revocation by means of polynomial function. It supports active groups resourcefully, when novel user joins within group otherwise user is revoked from group, private keys of other users do not require to obtain updated. Our method is capable of doing fine-grained access control, by group user list, any user within group could use the muse within cloud and revoked users cannot access cloud another time after revoking.
Keywords
References
E.Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and DistributedSystems Security Symp. (NDSS), pp. 131-145, 2003.
Xukai Zou, Yuan-shunDai, and ElisaBertino, “A practical and flexible keymanagement mechanism for trusted collaborative computing,”INFOCOM 2008, pp. 1211-1219.
M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policybased content sharing in public clouds,”IEEE Trans. on Know. andData Eng., vol. 25, no. 11, pp. 2602-2614, 2013.
Dolev,D.,Yao A. C.,"On the security of public key protocols",IEEE trans. on Information Theory,vol. IT-29, no. 2, pp.198–208, 1983.
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K.Fu,“Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc.USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
G. Ateniese, K. Fu, M. Green, and S. Hohenberger,“Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems SecuritySymp. (NDSS), pp. 29-43, 2005.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.