Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal
Keywords:
Knowledge Obstrucity, Forward Security, Universal ComposabilityAbstract
Cloud computing is rising as a rife knowledge interactive paradigm to understand users’ knowledge remotely hold on in a web cloud server. Cloud services offer nice conveniences for the users to relish the on-demand cloud applications while not c Knowledge Obstrucity, Forward Security, Universal Composability onsidering the native infrastructure limitations. Throughout the information accessing, completely different users could also be in a very cooperative relationship, and so knowledge sharing becomes vital to attain productive edges. The prevailing security solutions chiefly concentrate on the authentication to understand that a user’s privative knowledge cannot be unauthorized accessed, however neglect a delicate privacy issue throughout a user.It is difficult for the cloud server to request different users for knowledge sharing. The challenged access request itself might reveal the user’s privacy in spite of whether or not it will acquire the information access permissions. During this paper, we have a tendency to propose a shared authority primarily based privacy-preserving authentication protocol (SAPA) to deal with higher than privacy issue for cloud storage. Within the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy concerns (e.g., authentication, knowledge obscurity, user privacy, and forward security); 2) attribute primarily based access management is adopted to understand that the user will solely access its own knowledge fields; 3) proxy re-encryption is applied by the cloud server to supply knowledge sharing among the multiple users. Meanwhile, universal compos ability (UC) model is established to prove that the SAPA on paper has the planning correctness. It indicates that the projected protocol realizing privacy-preserving knowledge access authority sharing is enticing for multi-user cooperative cloud applications.
References
P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” National Institute of Standards and Technology,USA, 2009.
A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012.
R. Moreno-Vozmediano, R. S. Montero, and I. M. Llorente,“Key Challenges in Cloud Computing to Enable the Future Internet of Services,” IEEE Internet Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6203493, 2012.
K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14-22, 2010.
J. Chen, Y. Wang, and X. Wang, “On-Demand Security Architecture for Cloud Computing,” Computer, vol. 45, no. 7, pp. 73-78,2012.
Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable Data Possession for Integrity Verification in Multi-cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no, 12, pp. 2231-2244, 2012.
H. Wang, “Proxy Provable Data Possession in Public Cloud-s,” IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6357 181, 2012.
K. Yang and X. Jia, “An Efficient and Secure Dynamic Au-diting Protocol for Data Storage in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6311 398, 2012.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
C. Wang, K. Ren, W. Lou, J, Lou,“Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, 2010.
L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information
Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions
on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6374-615, 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.