Light Weight Secure Data Sharing Scheme with Data Integrity in Cloud Computing

Authors

  • M. Anjineyulu  Gates Institute of Technology, Gooty, Andhra Pradesh, India
  • J. Harathi  Gates Institute of Technology, Gooty, Andhra Pradesh, India
  • C. Karthik  Gates Institute of Technology, Gooty, Andhra Pradesh, India
  • P. Alekhya  Gates Institute of Technology, Gooty, Andhra Pradesh, India
  • V. Chandra Mohan Reddy  Gates Institute of Technology, Gooty, Andhra Pradesh, India
  • C. Soundarya  Assistant Professor, Gates Institute of Technology, Gooty, Andhra Pradesh, India

Keywords:

Security, Integrity, mobile cloud computing, data encryption.

Abstract

With the popularity of cloud computing, mobile devices can store / retrieve personal data anytime, anywhere. As a result, the data security problem in the mobile cloud is exacerbated and prevents further development of the mobile cloud. There are significant studies conducted to improve cloud security. However, most of them do not apply to the mobile cloud as mobile devices only have limited computing resources and power. Mobile cloud applications require a lot of solutions with less computational overhead. In this paper, we propose Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing.

References

  1. Gentry C, Halevi S. Implementing gentry’s fully-homomorphic encryption scheme. in: Advances in Cryptology–EUROCRYPT 2011. Berlin, Heidelberg: Springer press, pp. 129-148, 2011.
  2. Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. in: Proceeding of IEEE Symposium on Foundations of Computer Science. California, USA: IEEE press, pp. 97-106, Oct. 2011.
  3. Qihua Wang, Hongxia Jin. "Data leakage mitigation for discertionary access control in collaboration clouds". the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), pp.103-122, Jun. 2011.
  4. Adam Skillen and Mohammad Mannan. On Implementing Deniable Storage Encryption for Mobile Devices. the 20th Annual Network and Distributed System Security Symposium (NDSS), Feb. 2013.
  5. Wang W, Li Z, Owens R, et al. Secure and efficient access to outsourced data. in: Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago, USA: ACM pp. 55-66, 2009.
  6. Maheshwari U, Vingralek R, Shapiro W. How to build a trusted database system on untrusted storage. in: Proceedings of the 4th conference on Symposium on Operating System Design & Implementation-Volume 4. USENIX Association, pp. 10-12, 2000.
  7. Kan Yang, Xiaohua Jia, Kui Ren: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. ASIACCS 2013, pp. 523-528, 2013.
  8. Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. in: Computer Security Foundations Workshop. IEEE press, pp. 14-111, 2006.
  9. Shi E, Bethencourt J, Chan T H H, et al. Multi-dimensional range query over encrypted data. in: Proceedings of Symposium on Security and Privacy (SP), IEEE press, 2007. 350- 364
  10. Cong Wang, Kui Ren, Shucheng Yu, and Karthik Mahendra Raje Urs. Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data. IEEE INFOCOM 2012, Orlando, Florida, March 25-30, 2012
  11. Yu S., Wang C., Ren K., Lou W. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010, pp. 534-542, 2010
  12. Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie: DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems. IEEE Transactions on Information Forensics and Security, Vol. 8, No. 11, pp.1790-1801, 2013.
  13. Stehlé D, Steinfeld R. Faster fully homomorphic encryption. in: Proceedings of 16th International Conference on the Theory and Application of Cryptology and Information Security. Singapore: Springer press, pp.377-394, 2010.
  14. Junzuo Lai, Robert H. Deng ,Yingjiu Li ,et al. Fully secure keypolicy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM symposium on Information, Computer and Communications Security (ASIACCS), pp. 239-248, Jun. 2014.

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
M. Anjineyulu, J. Harathi, C. Karthik, P. Alekhya, V. Chandra Mohan Reddy, C. Soundarya, " Light Weight Secure Data Sharing Scheme with Data Integrity in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.412-418, May-June-2022.