Secured information exchange in cloud using cross breed property based encryption

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Individuals have the ability to get to the web anyplace and whenever. Distributed computing is an idea that treats the assets on the Internet as a brought together element, to be specific cloud. The server farm administrators virtualized the assets as per the necessities of the clients and uncover them as capacity pools, which the clients can themselves use to store documents or information protest s. Physically, the assets may get put away over numerous servers. Thus, Data heartiness is a noteworthy prerequisite for such stockpiling frameworks. In this paper we have proposed one approach to give information power that is by imitating the message with the end goal that every capacity server stores a duplicate of the message. We have improved the safe distributed storage framework by utilizing a limit intermediary re-encryption strategy. This encryption conspire bolsters decentralized deletion codes connected over scrambled messages and information sending operations over encoded and encoded messages. Our framework is exceedingly dispersed where every capacity server freely encodes and forward messages and key servers autonomously perform incomplete decoding.

     


  • Keywords


    Information Exchange; Social Network; Cloud

  • References


      [1] A. Juels and B. S. Kaliski, “Pors, proofs of retrievability for large files,”in Proc. 14th ACM Conf. Computer and Commun. Security (CCS'07),2007, pp. 584–597

      [2] G. Ateniese,R.Burns,R.Curtmola, J. Herring,O.Khan, L. Kissner, Z.Peterson, andD. Song, “Remote data checking using provable data possession,”ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, Jun. 2011

      [3] 4.G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, “Provable data possession at untrusted stores,” in Proc.14th ACM Conf. Computer andCommun. Security (CCS'07), 2007, pp.

      [4] S.-T. Shen and W.-G. Tzeng, “Delegable provable data possession for remote data in the clouds,” in Proc. 13th Int. Conf. Information and common. Security (ICICS'11), 2011, pp. 93–111.https://doi.org/10.1007/978-3-642-25243-3_8.

      [5] K. D. Bowers, A. Juels, and A. Oprea, “Hail, a high- availability and integrity Layer for cloud storage,” in Proc.16th ACM Conf. Computer and Commun. Security (CCS'09), 2009, pp. 187–198.

      [6] B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proc. 2nd ACM Workshop Cloud Computing Security (CCSW'10), 2010, pp. 31–42.

      [7] H.-Y. Lin and W.-G. Tzeng, “A Secure Decentralized Erasure Code for Distributed Network Storage,” IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 11, pp. 1586-1594, Nov. 2010.https://doi.org/10.1109/TPDS.2010.27.

      [8] K.Vijayakumar•C,Arun,Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing,Sept 2017.

      [9] K.Vijayakumar•C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.

      [10] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development environments,J Ambient Intell Human Computing, Springer-Verlag Berlin Heidelberg May 2017.


 

View

Download

Article ID: 9823
 
DOI: 10.14419/ijet.v7i1.9.9823




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.