Paper Title : Secure Encrypted Scheme Over Outsourcing Data for Query on MultiCloud Platform
ISSN : 2394-2231
Year of Publication : 2021
10.29126/23942231/IJCT-v8i4p5
MLA Style: Ms. Gayatri Patil,Prof. Mr. Rahul Gaikwad " Secure Encrypted Scheme Over Outsourcing Data for Query on MultiCloud Platform " Volume 8 - Issue 4 July-August , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Ms. Gayatri Patil,Prof. Mr. Rahul Gaikwad " Secure Encrypted Scheme Over Outsourcing Data for Query on MultiCloud Platform " Volume 8 - Issue 4 July-August , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
A secure knowledge cluster sharing and conditional dissemination theme with multi-owner in cloud computing, within which data owner will share non-public information with a group of users via the cloud in an exceedingly secure manner, and knowledge communicator will publicize the info to a brand new cluster of users if the attributes satisfy the access policies within the ciphertext. We have a tendency to additional gift a multiparty access management mechanism over the disseminated ciphertext, within which the info co-owners will append new access policies to the ciphertext thanks to their privacy preferences. Moreover, 3 policy aggregation ways, together with full permit, owner priority and majority permit, are provided to solve the privacy conflicts downside caused by completely different access policies. Many schemes are recently advanced for storing information on multiple clouds. Distributing data over completely different cloud storage suppliers (CSPs) mechanically provides users with a definite degree of data run management, for no single purpose of attack will leak all the knowledge. However, unplanned distribution of data chunks will cause high information revealing even whereas exploitation multiple clouds. An efficient storage plan generation algorithmic rule supported cluster for distributing information chunks with least data escape across multiple clouds. So to provide more security to users data we will divide our data into blocks and upload each block to different cloud providers.
Reference
[1]. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” Proc. IEEE Symposium on Security and Privacy (SP ‘07), pp. 321-334, 2007. [2]. H. Chen, Y. Hu, P. Lee, and Y. Tang, “Nccloud: A networkcoding-based storage system in a cloud-of-clouds,” 2013. [3]. H. Cui, X. Yi, and S. Nepal, “Achieving scalable access control over encrypted data for edge computing networks,” IEEE Access, vol. 6, pp. 30049–30059, 2018. [4]. K. Xue, W. Chen, W. Li, J. Hong, and P. Hong, “Combining data owner-side and cloud-side access control for encrypted cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2062–2074, 2018. [5]. C. Delerabl´ee, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” Proc. International Conf. on the Theory and Application of Cryptology and Information Security (ASIACRYPT ‘2007), pp. 200-215, 2007. [6]. B. Lang, J. Wang, and Y. Liu, “Achieving flexible and selfcontained data protection in cloud computing,” IEEE Access, vol. 5, pp. 1510- 1523, 2017. [7]. L. Liu, Y. Zhang, and X. Li, “KeyD: secure key-deduplication with identity-based broadcast encryption,” IEEE Transactions on Cloud Computing, 2018, https://ieeexplore.ieee.org/document/8458136. [8]. N. Paladi, C. Gehrmann, and A. Michalas, “Providing user security guarantees in public infrastructure clouds,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 405-419, 2017. [9].T. G. Papaioannou, N. Bonvin, and K. Aberer, “Scalia: an adaptive scheme for efficient multi-cloud storage,” in Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis. IEEE Computer Society Press, 2012, p. 20. [10]. Z. Yan, X. Li, M.Wang, and A. V. Vasilakos, “Flexible data access control based on trust and reputation in cloud computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 485-498, 2017. [11]. H. He, R. Li, X. Dong, and Z. Zhang, “Secure, efficient and finegrained data access control mechanism for P2P storage cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 471-484, 2014. [12]. Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A survey of proxy reencryption for secure data sharing in cloud computing,” IEEE Transactions on Services Computing, 2018, https://ieeexplore.ieee.org/docu ment/7448446. [13]. J. Son, D. Kim, R. Hussain, and H. Oh, “Conditional proxy reencryption for secure big data group sharing in cloud environment,” Proc. of 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 541–546, 2014 [14]. S. Choy, B. Wong, G. Simon, and C. Rosenberg, “A hybrid edgecloud architecture for reducing on-demand gaming latency,” Multimedia Systems, pp. 1–17, 2014. [15]. L. Jiang, and D. Guo “Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage,” IEEE Access, vol. 5, pp. 13336 – 13345, 2017. [16]. K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, Y. Yu, and A. Yang, “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generation Computer Systems, vol. 52, pp. 95-108, 2015. [17.] Q. Huang, W. Yue, Y. He, and Y. Yang, “Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing,” IEEE Access, vol. 6, pp. 36584–36594, 2018. [18]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” Proc. 13th ACM Conf. on Computer and Communications Security (CCS ‘06), pp.89- 98, 2006. [19]. S. Wang, K. Liang, J. K. Liu, J. Chen, J. Yu, and W. Xie, “Attribute based data sharing scheme revisited in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1661–1673, 2016. [20]. L. Guo, C. Zhang, H. Yue, and Y. Fang, “A privacy-preserving social assisted mobile content dissemination scheme in DTNs,” Proc. 32nd IEEE International Conf. on Computer Communications (INFOCOM ‘2013), pp. 2301-2309,
Keywords
— Data Sharing, Conditional Proxy re-encryption, Attribute-based encryptionn , Privacy Conflict, System Attackability, Remote Synchronization, Distribution and Optimization