A Survey on Sharing Data in Cloud
DOI:
https://doi.org/10.26438/ijcse/v6si3.123126Keywords:
cloud computing, attribute-based encryption, Key Exchange, Data SharingAbstract
Cloud is an online storage application mainly used to store documents, media and various files. However, due to large and easy access of cloud there arise various security issues such as data stealing and authentication issues when trying to share data on public platform. Fine-grained sharing of encrypted data is achieved through Attribute-based encryption. This is done with a methodology to provide data confidentiality and integrity using key generation, encryption and decryption. There are various techniques used to share data in cloud and each of these techniques employ different procedures or steps to achieve the end result. One among those techniques are public key encryption techniques which is a form of asymmetric key encryption where both public and private keys are used to keep the data or document secure. A security model is built through verifiable decryption algorithm. This is achieved by introducing a verification key from the output of the encryption algorithm. Finally, we present an approach to securely share data in an efficient manner through the ABE scheme.
References
Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui, “Towards Encrypted Cloud Media Center with Secure Deduplication” IEEE Transactions on Multimedia, Vol.19, Issue.2, 2017.
Nicolae Paladi, Christian Gehrmann, Antonis Michalas, “Providing User Security Guarantees in Public Infrastructure Clouds” IEEE Transactions on Cloud Computing, Vol.5, Issue.3, 2017.
Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2015. doi: 10.1109/TCC.2016.2545668
Mazhar Ali,Revathi Dhamotharan,Eraj Khan,Samee U.Khan,Athanasios V.Vasilakos,Keqin Li and Albert Y.Zomaya, “SeDaSC: secure data sharing in clouds” IEEE Systems Journal, Vol.11, Issue.2, 2017.
Mazhar Ali,Saif U.R.Malik and Samee U.Khan, “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party” IEEE Transactions on Cloud Computing Vol.5, Issue.4, 2017.
Ruixuan Li; Chenglin Shen; Heng He; Zhiyong Xu; Cheng-Zhong Xu, “A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2649685
Jian Shen , Tianqi Zhou, Xiaofeng Chen, Jin Li, and Willy Susilo, “Anonymous And Traceable Group Data Sharing In Cloud Computing” IEEE transactions on information forensics and security, Vol.13, Issue.4, 2018.
Joseph K. Liu, Man Ho Au,Xinyi Huang, Rongxing Lu, and Jin Li, “Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services” IEEE Transactions on Information Forensics and Security, Vol.11, Issue.3, 2016.
Bernardo Ferreira, Joao Rodrigues, Joao Leitao, Henrique Domingos, “Practical Privacy-Preserving Content-Based Retrieval In Cloud Image Repositories” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2669999
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun, “Securing Cloud Data Under Key Exposure” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2670559
Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay, “Provably Secure Key-Aggregate Cryptosystems With Broadcast Aggregate Keys For Online Data Sharing On The Cloud”
IEEE Transactions on Computers, Vol.66, Issue.5, 2017.
Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma, “Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption” IEEE Transactions On Information Forensics And Security, Vol.10, Issue.7, 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
