Implementation of key-cryptosystem for efficient data sharing in cloud environment

  • Authors

    • Roaa Falih Mahdi
    • Salman Goli
    • Jumana Waleed Diyala University
    2018-06-23
    https://doi.org/10.14419/ijet.v7i3.13676
  • Key-Cryptosystem, Data Sharing, Distributed Computing, Cloud Environment.
  • The distributed storage based on data recovery administration is a promising innovative way that mounts market actively sooner rather than later. However, in spite of the various studies which have been done in terms of secure information recovery over encoded information in cloud administrations, the majority of these studies concentrated on the strict security given to information in an outside space. Those methodologies oblige dynamite expenses to unify on cloud administration supplier that can be an important hindrance to accomplish productive information recovery in distributed storage. In this paper, a proficient information recovery plan utilizing property based encryption was proposed. The proposed plan is most appropriate for distributed storage frameworks with the gigantic measure of infor-mation. Affluent expressiveness as access control and quick pursuits with straightforward examinations of looking elements were given. Additionally, the plan ensures information security and client protection among information recovery process.

     

     

  • References

    1. [1] Antonopoulos, N., & Gillam, L, (2010), "Cloud computing: Principles, systems and applications", Springer Science & Business Media, p. 1-4. https://doi.org/10.1007/978-1-84996-241-4.

      [2] Jumana Waleed, Huang Dong Jun, and Saad Hameed, (2014), “A robust Optimal Zero-Watermarking Technique for Secret Watermark Sharing," International Journal of Security and Its Applications Vol.8, No.5, pp.349-360. https://doi.org/10.14257/ijsia.2014.8.5.31.

      [3] Jumana Waleed, Huang Dong Jun, Saad Hameed., (2015), "An optimized digital image watermarking technique based on cuckoo search (CS)", ICIC Express Letters, Part B: Applications, Vol. 6, No. 10, pp. 2629-2634.

      [4] Jumana Waleed, Huang Dong Jun, Saad Hameed and May Kamil, (2015), "Optimal Positions Selection for Watermark Inclusion based on a Nature Inspired Algorithm", International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 8, No. 1, pp. 147-160. https://doi.org/10.14257/ijsip.2015.8.1.15.

      [5] Jumana Waleed, Sarah Saadoon Jasim, Thekra Abbas, "The inclusion of watermarks based on QR Code analysis", (2018), International Journal of Engineering and Technology(UAE), Vol. 7, No. (2.9), pp. 97-101.

      [6] Ramgovind S., Eloff M. M., and Smith E., (2010), "The management of security in cloud computing", IEEE, In Information Security for South Africa (ISSA), pp. 1-7. https://doi.org/10.1109/ISSA.2010.5588290.

      [7] Okuhara, M., Shiozaki, T., and Suzuki, T., (2010), "Security architecture for cloud computing", Fujitsu Sci. Tech. J, 46(4), pp. 397-402.

      [8] Subashini, S., and Kavitha, V., (2011), "A survey on security issues in service delivery models of cloud computing", Journal of network and computer applications, 34(1), p 1-11. https://doi.org/10.1016/j.jnca.2010.07.006.

      [9] Houidi, I., Mechtri, M., Louati, W., and Zeghlache, D., (2011), "Cloud service delivery across multiple cloud platforms", In Services Computing (SCC), 2011 IEEE International Conference on, p. 741-742. https://doi.org/10.1109/SCC.2011.107.

      [10] Zissis, D., and Lekkas, D., 2012, "Addressing cloud computing security issues", Future Generation computer systems, 28(3), pp. 583-592. https://doi.org/10.1016/j.future.2010.12.006.

      [11] C. K. Chu, S. S. M. Chow, W. G. Tzeng, J. Zhou and R. H. Deng, (2014), "Key- Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage", in IEEE Transactions on Parallel and Distributed Systems, 25(2), pp. 468-477. https://doi.org/10.1109/TPDS.2013.112.

      [12] P. Gharjale and P. Mohod, (2015), "Efficient public key cryptosystem for scalable data sharing in Cloud storage", 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC), pp. 0325-0329. https://doi.org/10.1109/ICCPEIC.2015.7259485.

      [13] V. Swathy, K. Sudha, R. Aruna, C. Sangeetha and R. Janani, (2016), "Providing advanced security mechanism for scalable data sharing in cloud storage", 2016 International Conference on Inventive Computation Technologies (ICICT), pp. 1-6. https://doi.org/10.1109/INVENTIVE.2016.7830237.

      [14] Snata Choudhury and Kirubanand V. B, (2018), " Data encryption in public cloud using multi-phase encryption model", International Journal of Engineering and Technology(UAE), Vol. 7, No. 1, pp. 223-227. https://doi.org/10.14419/ijet.v7i1.9309.

  • Downloads

  • How to Cite

    Falih Mahdi, R., Goli, S., & Waleed, J. (2018). Implementation of key-cryptosystem for efficient data sharing in cloud environment. International Journal of Engineering & Technology, 7(3), 1172-1176. https://doi.org/10.14419/ijet.v7i3.13676