Secure File Sharing between Multiple Clouds using Encrypted Mechanism
Keywords:
Security, Data sharing, Cloud computing, key policies, SHA (Secure Hash Algorithm1)Abstract
A large amount of the data is stored in the file one can retrieve or access the stored data easily. Now-a-days most of the people are concentrate on the file sharing for sharing the important data. But many techniques are concentrating on owner to single user filesharing. In this paper, we propose File share for the secure data sharing between the multiple organizations in the different clouds for the multiple users. The proposed protocol is based on the revocable key- policy Attribute- Based Encryption schemes and it allows a lot of users to share the data in the cloud based on the policy which is defined by the data owner . Furthermore, access to a malicious or compromised user/organization can be easily revoked without the need to generate fresh encryption keys. The file is shared to the multiple users of the particular category by the owner. By this a lot of time is saved as the data corresponding to the particular category are shared to all the users registered with that particular category.
References
- R Dowsley, A. Michalas, and M. Nagel, "A report on design and implementation of protected searchable data in iaas," tech. rep., Swedis Institute of Computer Science (SICS), 2016.
- Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hbsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," in Proceedings of the 5th International Conference on Cloud Computing and Services Science, pp. 206 213, 2015.
- A Michalas and K. Y. Yigzaw, "Locless: Do you really care your cloud files are?," in 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC), pp. 618-623, Dec 2015.
- A Michalas, "Sharing in the rain: Secure and efficient data sharing for the cloud," in 2016 International Conference for Internet Technology And Secured Transactions, pp. 589-595, Dec 2016.
- N Paladi, A. Michalas, and C. Gehrmann, "Domain based storage protection with secure access control for the cloud," in Proceedings of the 2014 International Workshop on Security in Cloud Computing, ASIACCS 14, (New York, NY, USA), ACM, 2014.
- Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hubsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," pp. 1-16, 2017.
- A Sahai and H. Seyalioglu, "Dynamic credentials and ciphertext delegation for attribute-based encryption," in in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO2012, pp. 199-217, Springer, 2012.
- D Dolev and A. C. Yao, "On the security of public key protocols," Information Theory, IEEE Transactions on, vol. 29, no. 2, 1983.
- A Michalas, N. Komninos, N. R. Prasad, and V. A. Oleshchuk, "New client puzzle approach for dos resistance in ad hoc networks," in Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, pp. 568-573, IEEE, 2010.
- A. Michalas, N. Komninos, and N. R. Prasad, "Mitigate dos and ddos attack in mobile ad hoc networks," International Journal of DigitaCrime and Forensics (IJDCF), vol. 3, no. 1, pp. 14-36, 2011.
- A. Michalas, N. Komninos, and N. Prasad, "Multiplayer game for ddos attacks resilience in ad hoc networks," in Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, pp. 1-5, Feb 2011.
- A. Michalas, N. Komninos, and N. R. Prasad, "Cryptographic puzzles and game theory against dos and ddos attacks in networks," International Journal of Computer Research, vol. 19, no. 1, p. 79, 2012.
- T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments," in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5, May 2012.
- T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments in the presence of malicious adversaries," Ad Hoc Networks, vol. 15, pp. 53-66, Apr. 2014
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.