SECURE DATA SHARING IN CLOUDS USING USER REVOCATIONS
Journal: International Journal of Advanced Research (Vol.6, No. 5)Publication Date: 2018-05-01
Authors : Priyanka V. Surnar; S. G. Swami.;
Page : 1384-1393
Keywords : Confidentiality Integrity Forward-Backward Access Control Thread Security Asymmetric Key.;
Abstract
Cloud computing is technique that provides data privacy and reliability, access control, data forwarding(sharing) without using compute-intensive re-encryption, insider threat security, and forward and backward access control. The SeDaSC technique encrypts a file with a single encryption key. Two different key shares for each of the users are generated, with the user only receiving one share. The control of a single share of a key allows the SeDaSC attitude to counter the insider threats. The other key share is stored by a trusted third party, which is called the cryptographic server. This method is applicable to usual and mobile cloud computing environments. We implement a working prototype of the SeDaSC method and assess its performance based on the time consumed during a choice of operations. We officially confirm the working of SeDaSC by using high-level Petri nets, a Z3 solver.
Other Latest Articles
- EFFECTIVE ADVERTISING: A COMMUNICATING PERSPECTIVE
- PRODUCTION HALIEUTIQUE AU S?N?GAL : CONTRIBUTION DE LA TRANSFORMATION ? L??CONOMIE MARITIME ET NOUVELLES STRAT?GIES POUR AM?LIORER LA FERMENTATION TRADITIONNELLE DU POISSON
- SAMAJIK VYAVASATHA AUR SHIKSHA PER NIRDHANTA KA PRABHAV : EK DRUSTHIKON
- THE EFFECTIVENESS OF THE MODULE-BASED STEM (SCIENCE, TECHNOLOGY, ENGINEERING, MATHEMATICS) TO STUDY PHYSICS AT VOCATIONAL HIGH SCHOOL
- BANKI IN THE PERIOD OF CRISIS AND CONFLICTS
Last modified: 2018-06-23 18:35:33