Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Information Distribution in Cloud Computing

C. Leena, A. Daison Raj, M. BalaAnand

Abstract


Cloud computing would be the supply involving computing services online. It allow persons and also corporations to utilize software and also equipment which are handled by simply 3 rd parties on distant destinations. Though the end user can't discuss sensitive info inside untrusted cloud as a result of lack of safety measures problems. With this document we offer safety measures towards the end user by the ways of encryption and also decryption. When the end user uploads the actual document, technique critical will be made by simply CP-ABE approach. This particular technique critical will be provided for highly regarded end user email no .. The person utilizes this critical pertaining to decryption in order to track one more critical, that may acquire particular document. A different factor in this document acquire and also publish charge involving sole end user and also collection could be represented as information.


Keywords


Wireless Circle, Facts Discussing, Cloud Research.

Full Text:

PDF

References


M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136- 149, Jan. 2010.

B. Wang, B. Li, and H. Li, “Knox: Privacy Preserving Auditing for Shared Data with Large Groups in the Cloud,” Proc. 10th Int’l Conf. Applied Cryptography and Network Security, pp. 507-525, 2012

A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

Lu H., Kim K.S., and Sahni S. (Mar. 2005), “Prefix and Interval-Partitioned Dynamic IP Router-Tables,” IEEE Trans. Computers, vol. 54, no. 5, pp. 545-557.

Mun J.H., Lim H., and Yim C.( 19 June 2006), “Binary Search on Prefix Lengths for IP Address Lookup,” IEEE Comm. Letters, vol. 10,pp. 492-494.

Wentao Zhang, Qian Wu , Wang Yang and Hewu Li (Aug 2010), “Reliable Multipath Transfer Scheduling Algorithm Research and Prototype Implementation”.

G. Apostolopoulos, V. Peris, P. Pradhan, and D. Sara, “Securing Electronic Commerce: Reducing the SSL Overhead,” IEEE Network, 2000.

S. Bohacek, J.P. Hespanha, K. Obraczka, J. Lee, and C. Lim,“ Enhancing Security via Stochastic Routing,” Proc. 11th Int’l Conf

Computer Comm. and Networks (ICCCN), 2002.

D. Collins, Carrier Grade Voice over IP. McGraw-Hill, 2003.

T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press, 1990.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.