A Survey on Data Sharing Using Encryption Technique in Cloud Computing

نویسنده

  • Swarup kshatriya
چکیده

A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. In this technology users have to entrust their data to cloud providers, there are several security and privacy concerns on outsourced data. In this paper, survey on several schemes such as Key-Policy Attribute-Based Encryption, Ciphertext-Policy AttributeBased Encryption, Ciphertext Policy Attribute Set Based Encryption, Fuzzy Identity-Based Encryption, Hierarchical Identity-Based Encryption, Hierarchical Attribute-Based Encryption and Hierarchical Attribute-SetBased Encryption for access control of outsourced data are discussed. Keywords— Cloud computing; data confidentiality; finegrained access control.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Green Energy-aware task scheduling using the DVFS technique in Cloud Computing

Nowdays, energy consumption as a critical issue in distributed computing systems with high performance has become so green computing tries to energy consumption, carbon footprint and CO2 emissions in high performance computing systems (HPCs) such as clusters, Grid and Cloud that a large number of parallel. Reducing energy consumption for high end computing can bring various benefits such as red...

متن کامل

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Mobile cloud computing provides the capability of sharing of the data that is encrypted with different user through cloud Storage. This raises the point of security issues over data confidentiality and authentication access control. The blind storage allows a client to store the number of files on remote server, where remote server is not familiar with the files that are stored in it. In Attrib...

متن کامل

Multi Owner Data Sharing with Privacy Preserving in Cloud Security Mediator

Cloud computing provide a promising pattern for data security services and high-quality data services .it provides various solution for sharing data with security concerns from dynamic resources in multi pattern based on storing and sharing have several issues from the multiple data owners are involved, the aspects of membership and data sharing need to be addressed. In this paper we proposed a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014