Protocol for Group Key Management for Cloud Storage File Sharing
Keywords:
Advanced Encryption Standards, Data Storage, Security, Encryption And Decryption.Abstract
Cloud storage is growing in popularity due to many businesses' large-scale sharing demands. Because shared files are stored outside of the owner's trust zone, cloud computing raises both expectations and concerns regarding file security. This paper proposes a Gathering Key Administration Convention for cloud record sharing. In response to public channel threats to the network, a hybrid encryption-based group key generation strategy is presented. Besides, a check framework is utilized to protect shared documents from cloud suppliers and gathering individuals intriguing to go after them. The suggested protocol is secure and efficient for data exchange in cloud computing, according to security and performance evaluations.
References
- CPDA: A Privacy Protecting Deduplication Distributed Storage With Public Cloud Evaluating, IEEE Access, vol.7, pp.160482-160497, 2019. 1. J. Wu, Y. Li, T. Wang, et al.
- C. Po-Wen and L. Jawline, "Review Free Distributed storage through Deniable AttributeBased Encryption," IEEE Exchanges on Distributed computing, vol. 6, no. 2, pp. 414-427, 2018.
- J. Zhou and co., Getting rethought information in the multi-authority cloud with fine-grained admittance control and effective characteristic repudiation", Comput. J., vol. 60, no. 8, pp. 1210-1222, Aug. 2017.
- "Comments on Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing," by Hu, Jianfei, is published in IEEE Transactions on Dependable and Secure Computing. 14, no. 4, pp. 461-462, August 2017.
- Z. Fu X. Sun S. Ji G. Xie "Towards productive substance mindful pursuit over encoded reevaluated information in cloud" Proc. 35th Annu. Int. IEEE Conf. Comput. Public ( INFOCOM), pages 1-9 Apr. 2016.
- Y. S. Rao, "A protected and productive ciphertext-strategy property based signcryption for individual wellbeing record partaking in distributed computing," Group of people yet to come PC Frameworks, vol. 67, no. 1, pp. February 2017, pp. 133-151
- H. liu Y. huang J. K. Liu "Secure sharing of Individual Wellbeing Records in distributed computing: Ciphertext-Strategy Property Based Signcryption" Future Gener. Comput. Syst. vol. 52 pp. 67-76 Nov. 2015.
- Fu, Q., Zhang, Y., and Chen, J. (2013). A Solid Gathering Key Administration Plan for Distributed storage. In 2013 twelfth IEEE Global Meeting on Trust, Security and Protection in Processing and Correspondences (pp. 1530-1535). IEEE. doi: 10.1109/TrustCom.2013.192
- Khan, N., and Alghathbar, K. (2015). A survey of gathering key administration strategies for cloud administrations. 50, 1-12, Journal of Network and Computer Applications. doi: 10.1016/j.jnca.2014.08.008
- Yu, S., Zhang, Y., and Guo, S. (2016). Over encrypted cloud data, a secure and dynamic multi-keyword ranked search scheme. IEEE Exchanges on Equal and Conveyed Frameworks, 27(2), 340-352. doi: 10.1109/TPDS.2015.2391998
- Shahriar, H., Rahman, M. S., and Islam, R. (2017). Group Key Management for Safe Cloud-Based Data Sharing In 2017 fourth Worldwide Meeting on Electrical Designing and Data and Correspondence Innovation (ICEEICT) (pp. 1-6). IEEE. doi: 10.1109/ICEEICT.2017.7930083
- Zhang, Y., Zhang, J., and Xiong, H. (2014). A Safe Key Administration Plan for Gathering Information Partaking in Distributed storage. In 2014 IEEE Worldwide Gathering on Correspondences (ICC) (pp. 3575-3580). IEEE. doi: 10.1109/ICC.2014.6883887
- Cao, N., Wang, C., Li, M., Ren, K., and Lou, W. (2012). Protection safeguarding multi-watchword positioned search over encoded cloud information. IEEE INFOCOM in 2012 (pp. 353-361). IEEE. doi: 10.1109/INFCOM.2012.6195497
- Ren, K., Wang, C., and Wang, Q. (2014). Security challenges for the public cloud. IEEE Web Processing, 18(1), 69-73. doi: 10.1109/MIC.2014.5
- Ruj, S., Stojmenovic, M., and Nayak, A. (2014). Cloud-based data can be anonymously authenticated with decentralized access control. Parallel and Distributed Systems, IEEE Transactions, 25(2), 384-394. doi: 10.1109/TPDS.2013.229
- Lou, W., C. Wang, N. Cao, J. Li, K. Ren, and Toward secure and dependable limit organizations in conveyed figuring. IEEE Transactions on Services Computing, vol. 5(2), pages 220-232. doi: 10.1109/TSC.2011.39
- Yang, K., Jia, X., and L. Xie In data outsourcing systems, attribute-based access control with efficient revocation. In Procedures of the fifth ACM Conference on Data, PC and Correspondences Security (pp. 1-10). ACM. doi: 10.1145/2185448.2185462
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.