Accounting and Privacy Preserving of Data Owner in Cloud Storage

نویسندگان

چکیده

People use the support of distributed computing however can’t completely believe cloud suppliers to have protection and confidential information. To guarantee secrecy, data owners relocate encoded information rather than plain texts. divide documents with different clients, Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be utilized. But this cannot become secure against some other assaults. Many schemes did not gave that provider has power check whether a downloader unscramble or not. Consequently, these files are accessible everybody who is approachable storage. An intentionally harmful assailant download great many records start Economic Denial Sustainability (EDoS) attacks, it will extent expend asset. The owner bear all expenses for storage but doesn’t provide whole about access usage. There no transparency owner. We solve concerns. In order we going propose solution securing encrypted from EDoS attacks providing usage implementing by using arbitrary policy CP-ABE.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Preserving Accountable Cloud Storage

In cloud storage services, a wide range of sensitive information may be leaked to the host server via the exposure of access pattern albeit data is encrypted. Many security-provable schemes have been proposed to preserve the access pattern privacy; however, they may be vulnerable to attacks towards data integrity or availability from malicious users. This is due to the fact that, preserving acc...

متن کامل

Privacy Preserving Distributed Cloud Storage

Cloud computing models stores data and computing resources in virtual servers located in large data centres’ and are managed using a centralized architecture. Distributed cloud uses resources provided by users who are geographically distributed over a large area. Distributed cloud is completely decentralised and resources are provided in a P2P fashion. This model of distributed cloud is based o...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage

of “ Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage ” by Olga Ohrimenko, Ph.D., Brown University, May 2014 Cloud storage has emerged as the next generation of data storage where users can remotely store their data and leave its management to a third party, e.g., Amazon S3, Google Drive or Microsoft Azure. However, the fact that users no longer have physical possession ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of innovative technology and exploring engineering

سال: 2021

ISSN: ['2278-3075']

DOI: https://doi.org/10.35940/ijitee.f8715.0410621