Secure Dynamic Group Data Sharing in Semi-trusted Third Party Cloud Environment

Author(s):  
V E Sathishkumar ◽  
Wesam Atef Hatamleh ◽  
Abeer Ali Alnuaim ◽  
Mohamed Abdelhady ◽  
B. Venkatesh ◽  
...  
2018 ◽  
Vol 7 (2) ◽  
pp. 646
Author(s):  
Sathishkumar Easwaramoorthy ◽  
Anilkumar Chunduru ◽  
Usha Moorthy ◽  
Sravankumar B

Information sharing or exchange of data within entities plays a significant role in cloud storage. In cloud computing, a robust and practical methodology is developed which can be utilized by cloud users for sharing information among multiple group members in the cloud with lowered maintenance and management costs. Furthermore, a service provider in the cloud does not share data with anyone other than the Trusted Third Party (TTP) sources due to the semi-trusted characteristics of the cloud. In this way, there is no global security mechanism for dynamic group data sharing over the cloud. Subsequently, the Cloud Service Providers (CSPs) can convey different services to cloud users through powerful data centres. Hence, data is secured through the validation of users in the cloud. Meanwhile, CSPs should offer outsourced security assurance for data file sharing. Assuring privacy in data sharing is still a critical issue due to continuous change in cloud users, particularly, for unauthenticated or third party users because of the risk of collusion attacks. However, security concerns turn into a major restraint as outsourcing storage data is perhaps a delicate concern for cloud providers. Additionally, sharing information in a multi-proprietary approach while protecting information and individual security to the data from unauthorized or third party users is still a challenging task as there is a frequent change in cloud members. In this regard, previous studies are reviewed and discussed which are related to dynamic group data sharing using cloud computing.


2017 ◽  
Vol 5 (4) ◽  
pp. 642-655 ◽  
Author(s):  
Mazhar Ali ◽  
Saif U. R. Malik ◽  
Samee U. Khan

Author(s):  
Songzhu Mei ◽  
Cong Liu ◽  
Yong Cheng ◽  
Jiangjiang Wu ◽  
Zhiying Wang

2016 ◽  
Vol 26 (2) ◽  
pp. 170-184 ◽  
Author(s):  
Wei Guo ◽  
Yun Fang ◽  
Weimei Pan ◽  
Dekun Li

Purpose This paper aims to present a case wherein a public archive intervenes in maintaining and preserving digital records (including underlying technological infrastructure) created by a private company to protect the trustworthiness of records, thereby helping the company to discharge their accountability. Design/methodology/approach This paper details the intervention of Tianjin Municipal Archives in the management of the records of Tianjin Otis Elevator Co., Ltd, the technical infrastructure that enables and supports such configuration, the issues encountered and the theoretical implications of this case. Findings This case suggests that not only does the concept of archives as a trusted third party remain relevant in the changing technological environment but also, in certain cases (e.g. wherein the supplier of evidentiary documents holds a monopoly over an industry), archives are becoming increasingly critical in maintaining the reliability and authenticity of digital records in the cloud environment. Research limitations/implications Given the challenges raised by the emerging cloud environment, it is vital to develop a renewed understanding of the concept of archives as a trusted third party, the relationship between archives and commercial third party services and the relationship between public archives and private records. Furthermore, this case identifies the need to re-examine archival methodologies to protect the authenticity of structured data. Originality/value This case exemplifies how archives can help private organizations address issues related to guaranteeing and demonstrating the evidential nature of digital records and provides empirical evidence for archives being conceptualized as a trusted third party in maintaining and preserving digital records.


Information ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 340
Author(s):  
Ping Zhang ◽  
Huanhuan Chi ◽  
Jiechang Wang ◽  
Youlin Shang

Compared with the traditional system, cloud storage users have no direct control over their data, so users are most concerned about security for their data stored in the cloud. One security requirement is to resolve any threats from semi-trusted key third party managers. The proposed data security for cloud environment with semi-trusted third party (DaSCE) protocol has solved the security threat of key managers to some extent but has not achieved positive results. Based on this, this paper proposes a semi-trusted third-party data security protocol (ADSS), which can effectively remove this security threat by adding time stamp and blind factor to prevent key managers and intermediaries from intercepting and decrypting user data. Moreover, the ADSS protocol is proved to provide indistinguishable security under a chosen ciphertext attack. Finally, the performance evaluation and simulation of the protocol show that the ADSS security is greater than DaSCE, and the amount of time needed is lower than DaSCE.


Sign in / Sign up

Export Citation Format

Share Document