Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2022)
OneDrive personal cloud storage
De-biao He, Neeraj Kumar, S. Zeadally, Huaqun Wang (2018)
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management SystemsIEEE Transactions on Industrial Informatics, 14
Qingji Zheng, Qi Li, A. Azgin, J. Weng (2017)
Data verification in information-centric networking with efficient revocable certificateless signature2017 IEEE Conference on Communications and Network Security (CNS)
Jiguo Li, Hao Yan, Yichen Zhang (2020)
Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud StorageIEEE Systems Journal, 15
Baojiang Cui, Zheli Liu, Lingyu Wang (2016)
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud StorageIEEE Transactions on Computers, 65
Jiabin Deng, Juanli Hu, A. Liu, Juebo Wu (2010)
Research and Application of Cloud Storage2010 2nd International Workshop on Intelligent Systems and Applications
Xi Lin, Lin Sun, Haipeng Qu (2017)
An efficient RSA-based certificateless public key encryption schemeDiscret. Appl. Math., 241
I. Odun-Ayo, Olasupo Ajayi, B. Akanle, Ravin Ahuja (2017)
An Overview of Data Storage in Cloud Computing2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)
Hao Yan, Jiguo Li, Yichen Zhang (2020)
Remote Data Checking With a Designated Verifier in Cloud StorageIEEE Systems Journal, 14
S. Nayak, S. Tripathy (2018)
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud StorageIEEE Transactions on Services Computing, 14
Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin Chen, Jian Shen, Yi Tang (2018)
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in BlockchainIEEE Access, 6
(2022)
The pairing-based cryptography library
(2022)
Would you like to visit an Oracle country site closer to you?
Lei Zhang, Huaping Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Choo, Jiangtao Li (2022)
Cryptographic Solutions for Cloud Storage: Challenges and Research OpportunitiesIEEE Transactions on Services Computing, 15
Linmei Jiang, Donghui Guo (2017)
Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud StorageIEEE Access, 5
Ayush Agarwal, Siddhant Siddharth, Pratosh Bansal (2016)
Evolution of cloud computing and related security concerns2016 Symposium on Colossal Data Analysis and Networking (CDAN)
G. Pallis (2010)
Cloud Computing: The New Frontier of Internet ComputingIEEE Internet Computing, 14
Stavros Papadopoulos, S. Bakiras, Dimitris Papadias (2012)
pCloud: A Distributed System for Practical PIRIEEE Transactions on Dependable and Secure Computing, 9
Jiguo Li, Qihong Yu, Yichen Zhang (2019)
Hierarchical attribute based encryption with continuous leakage-resilienceInf. Sci., 484
Kedar Pathare, P. Chouragade (2017)
Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT)
J. Chen, Yuling Peng, Ruiying Du, Quan Yuan, Minghui Zheng (2015)
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage2015 IEEE Trustcom/BigDataSE/ISPA, 1
Jiguo Li, Hao Yan, Yichen Zhang (2019)
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud StorageIEEE Transactions on Cloud Computing, 10
Jiguo Li, Qihong Yu, Yichen Zhang, Jian Shen (2019)
Key-policy attribute-based encryption against continual auxiliary input leakageInf. Sci., 470
Yang Lu, Jiguo Li, Yichen Zhang (2020)
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoTIEEE Internet of Things Journal, 7
Cheng-Kang Chu, W. Zhu, Jinlei Han, Joseph Liu, Jia Xu, Jianying Zhou (2013)
Security Concerns in Popular Cloud Storage ServicesIEEE Pervasive Computing, 12
Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun (2017)
A secure cloud-assisted urban data sharing framework for ubiquitous-citiesPervasive Mob. Comput., 41
Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang (2017)
A Novel Efficient Remote Data Possession Checking Protocol in Cloud StorageIEEE Transactions on Information Forensics and Security, 12
Borislav Dordevic, S. Jovanovic, V. Timčenko (2014)
Cloud Computing in Amazon and Microsoft Azure platforms: Performance and service comparison2014 22nd Telecommunications Forum Telfor (TELFOR)
Cong Zuo, Jun Shao, Joseph Liu, Guiyi Wei, Y. Ling (2018)
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud StorageIEEE Transactions on Information Forensics and Security, 13
Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.Design/methodology/approachThe methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.FindingsData sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.Originality/valueFiles shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.
International Journal of Pervasive Computing and Communications – Emerald Publishing
Published: Nov 8, 2024
Keywords: SSD; Federated learning; Security; Data sharing; Efficiency; CSP; API; Cloud storage
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.