Privacy Preserving of Information Sharing for Authenticated users in Cloud Computing
International Journal of Engineering Trends and Technology (IJETT) | |
|
© 2015 by IJETT Journal | ||
Volume-30 Number-2 |
||
Year of Publication : 2015 | ||
Authors : Pradeep Kumar Regeti, BeharaVineela |
Citation
Pradeep Kumar Regeti, BeharaVineela"Privacy Preserving of Information Sharing for Authenticated users in Cloud Computing", International Journal of Engineering Trends and Technology (IJETT), V30(2),94-98 December 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Cloud computing is a promising information technology architecture for both enterprises and individuals. The cloud is most attractive by storage of data and also interactive paradigm of data consumers, network access and independent resource pooling. By implementing cloud architecture is very difficult for provide security and data access policy. So that in this paper we are proposed concepts of authentication of data consumers, generation of group and secure forward, data anonymity and security of transferring data. By performing those operations we can implement following concepts. In this paper we are proposed concepts for authentication of data consumers using group digital signature algorithm, data anonymity using block corruption protocol, group key generation using prime order group key generation and security of transferring data using triple data encryption standard. By implementing those techniques we can improve the efficiency, more data access authority sharing and privacy of forward data.
References
[1] P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” National Institute of Standards and Technology, USA, 2009.
[2] S. Grzonkowski and P. M. Corcoran, “Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking,” IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1424-1432, 2011.
[3] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220- 232, 2012.
[4] M. Nabeel, N. Shang and E. Bertino, “Privacy Preserving Policy Based Content Sharing in Public Clouds,” IEEE Transactions on Knowledge and Data Engineering, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6298891, 2012.
[5]. S. Sundareswaran, A. C. Squicciarini, and D. Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp.556-568, 2012.
[6]. X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6374615, 2012.
[7]. L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
[8]. Y. Xiao, C. Lin, Y. Jiang, X. Chu, and F. Liu, “An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing,” in Proceedings of Global Telecommunications Conference (GLOBECOM 2010), December 6-10, 2010.
[9]. H. Zhuo, S. Zhong, and N. Yu, “A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 9, pp. 1432-1437, 2011.
[10]. S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6463404, 2013.
[11]. J. Yu, P. Lu, G. Xue, and M. Li, “Towards Secure Multi- Keyword Top-k Retrieval over Encrypted Cloud Data,” IEEE Transactions on Dependable and Secure Computing, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6425381, 2013.
[12]. I. T. Lien, Y. H. Lin, J. R. Shieh, and J. L. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for K-nn Search,” IEEE Transactions on Information Forensics and Security, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6476681, 2013.
[13]. K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6311398, 2012.
Keywords
Cloud computing, authentication protocol, privacy preservation, shared authority.