Cloud Storage for Data Sharing: Infrastructure as Service (IaaS) in Cloud Environment

Author(s):  
Mallikarjuna B. ◽  
Arunkumar Reddy D.
2018 ◽  
Vol 7 (2.20) ◽  
pp. 224
Author(s):  
N Rajkumar ◽  
E Kannan

Cloud Computing is an emerging technology that uses the internet and remote servers to save information and application. Cloud computing enables customers and organizations to utilize applications without establishment and access their own documents at any computer with internet access. Collusion Resistant Secured the way to deal the fulfillment of an abnormal state of security with complete protection. A large portion of these techniques depend on a presumption that semi-trusted and arrangement is absent. In this paper, we concentrate on the issue of conspiracies, in which a few gatherings may connive and share their record to find the private data of different gatherings. The other related works better than this is more secure. This paper reveals an overview and study of collusion resistance techniques in more secure and efficient way for data sharing in cloud storage.


Author(s):  
Athulya V S ◽  
Dileesh E D

Cloud storage is used generally to store data and realize the data sharing with others. A cloud storage system stores large number of data in its storage server. Data that are stored to the cloud have to be secured in order to avoid the data from exploiting. There are several techniques and methods that are used to secure the data before uploading it to the cloud such as cryptographic encryption techniques. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Cloud Computing is well known today on account of enormous measure of data storage and quick access of information over the system. It gives an individual client boundless extra space, accessibility and openness of information whenever at anyplace. Cloud service provider can boost information storage by incorporating data deduplication into cloud storage, despite the fact that information deduplication removes excess information and reproduced information happens in cloud environment. This paper presents a literature survey alongside different deduplication procedures that have been based on cloud information storage. To all the more likely guarantee secure deduplication in cloud, this paper examines file level data deduplication and block level data deduplication.


Sign in / Sign up

Export Citation Format

Share Document