Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage

2019 ◽  
Vol 129 ◽  
pp. 25-36 ◽  
Author(s):  
Voundi Koe Arthur Sandor ◽  
Yaping Lin ◽  
Xiehua Li ◽  
Feng Lin ◽  
Shiwen Zhang

These days attribute-based encryption has been gotten as a promising strategy to give versatile and secure data to oversee the conveyed storage in the cloud registering environment. In the attribute-based encryption plan, the single property pro should execute the customer legitimacy check and mystery key flow, and thusly, its outcomes. Customers may be stuck in the believing that at a stretch get their mystery keys and choose to get the required data from Cloud. So as to maintain a strategic distance from the single-point execution bottleneck, we are proposing multi-master access control plan which will assess the issue such way that it gives increasingly successful access control on cloud data to the clients.


Cloud storage services turned out to be continuously elegant. Owing to the implication of security, a few cloud storage secret composing schemes are anticipated to monitor data from those that don't approach. Every single such plan accepted that cloud storage providers region unit safe and can't be hacked; at the same time, in pursue, a few experts may drive cloud storage providers to uncover client insider facts or confidential data on the cloud, hence by and large going around storage mystery composing schemes. Amid this paper, we tend to bless our style for a pristine cloud storage mystery composing subject that permits cloud storage providers to make persuading false client privileged insights to protect client security. Since coercers can't reveal whenever acquired insider facts zone unit genuine or not, the cloud storage providers ensure that client security keeps on being immovably secured. The vast majority of the anticipated schemes expect cloud storage service providers or dependable outsiders taking care of key administration square measure solid and can't be hacked; nonetheless, in pursue, a few substances would conceivably capture interchanges among clients and cloud storage providers at that point urge storage providers to unfasten client privileged insights by misuse government control or diverse proposes that. All through this case, scrambled information square measure thought to be known and storage provider's square measure asked for to unfasten client insider facts


Author(s):  
Nur Syahela Hussien ◽  
Sarina Sulaiman ◽  
Abdulaziz Aborujilah ◽  
Merlinda Wibowo ◽  
Hussein Samma

<span>Today, there are high demands on Mobile Cloud Storage (MCS) services that need to manage the increasing number of works with stable performance. This situation brings a challenge for data management systems because when the number of works increased MCS needs to manage the data wisely to avoid latency occur. If latency occurs it will slow down the data performance and it should avoid that problem when using MCS. Moreover, MCS should provide users access to data faster and correctly. Hence, the research focuses on the scalability of mobile cloud data storage management, which is study the scalable on how deep the data folder itself that increase the number of works.</span>


Mobile Cloud Computing (MCC) is the combination of mobile computing, cloud computing and wireless networks to make mobile thin client devices resource-rich in terms of storage, memory computational power and battery power by remotely executing the wide range of mobile application’s data in a pay-per-use cloud computing environment. In MCC, one of the primary concern is the security and privacy of data stored in cloud. The existing techniques are not efficient to manage secret keys during key generation and key distribution processes. The objective of this project work is to develop a secure collaborative key management system (SCKMS) for mobile cloud data storage by implementing by the cryptographic techniques for file encryption and file decryption, key generation, key encryption, key distribution and key decryption processes. In our proposed methodology, DriverHQ public cloud infrastructure is used for accessing the secure file as Storage as a Service (SaaS) mechanism. For generating the secret key, the proposed work implemented with Pseudo Random Number Generator (PRNG) algorithm, it produces the sequence of random numbers for every time. The keys are distributed using general Secret key Sharing Scheme (SSS). The key pattern matching process is implemented to spilt the secret key into three partitions and sent it to client (mobile devices), cloud server and decryption server. The decryption server key and cloud sever key are mapped with client key. The key shares are grouped together using key-lock pair mechanism and it achieves key integrity during untrusted medium communication. The proposed work also eliminates key escrow and key exposure problems. The files are encrypted and decrypted using Rivest-Shamir-Adleman (RSA) algorithm. The RSA algorithm is more vulnerable against the brute force attack, because of using larger key size. Thus, the proposed SCKMS achieves data confidentiality and data integrity in mobile cloud storage data when compared to existing Key Management System (KMS). The work also reduces encryption & decryption computation and storage overhead in client mobile devices, and minimizes the energy consumption of the mobile devices efficiently


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document