A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE

2018 ◽  
Vol 8 (3) ◽  
pp. 32-47 ◽  
Author(s):  
Cheng Li ◽  
Zhiyong Zhang ◽  
Lanfang Zhang

This article finds that with the development of network technology and the change of a users' social habits, the existing multimedia social network, whether it is one-to-one authorization or one-to-many authorization, are having difficulty meeting the needs of users and cloud storage service. In order to solve this problem, this article proposes a new authorization scheme of multimedia community, based on attribute encryption. Use MA-CP-ABE solution to enhance system service efficiency. This program contributes to two aspects: (1) combining user trust with attribute-based authorizations, and (2) enhancing the flexibility and security of the solution. The scheme has been applied in the prototype system and achieved good results. Results prove that the program has good application value for cloud storage technology, IoT and many other fields.

Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2016 ◽  
Vol 24 (2) ◽  
pp. 57-74 ◽  
Author(s):  
Chen-Shu Wang ◽  
Cheng-Yu Lai ◽  
Shiang-Lin Lin

In recent year, mobile devices have become an indispensable product in our daily life. Extensive amount of mobile applications (Apps) have been developed and used on these devices. Restated, in terms of the Apps future development and popularization, to understand why people have willingness to pay for use certain Apps has apparently became an important issue. However, there are various homogeneity Apps, which people can easily find some free succedaneum for use. Consequently, it would be an interesting issue to realize individual's intention to pay for use the Apps. In this study, the authors conducted a survey in Taiwan to realize individuals' willingness to pay for Cloud Storage Service (CSS), since CSS is one of the frequently adopted App for most mobile device users. The results show that both the perceived service quality and conformity positively affect the perceived value and then increases the user's willingness to pay indirectly. In addition, the findings also support that the users' product knowledge about CSS produce negative moderating effects on the perceived value and the willingness of pay.


2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

2019 ◽  
Vol 15 (4) ◽  
pp. 155014771984127 ◽  
Author(s):  
Gang Yu ◽  
Yongjuan Wang ◽  
Zhenfu Cao ◽  
Jian Lin ◽  
Xiangyu Wang

2016 ◽  
Vol 11 (2) ◽  
pp. 126-134
Author(s):  
Ma Haifeng ◽  
Gao Zhenguo ◽  
Yao Nianmin

Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC)) method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC.


Sign in / Sign up

Export Citation Format

Share Document