SDS: A Framework for Secure Data Sharing in Database as a Service
Journal Title: Bonfring International Journal of Data Mining - Year 2017, Vol 7, Issue 1
Abstract
Cloud computing is a magic and attractive technology to the single user to large enterprises to store their data. It has less expensive and useful model for enterprise who concentrates more on themes instead of buying products. But, obstacle for the cloud is privacy and unauthorized access of users from internal or external. To achieve the privacy of data from the internal the client stores their sensitive data in the encrypted form. But for the large organizations, the delegated contents are shared by various users. So, we are in the need of an efficient access control mechanisms which coupled with encrypted data to privacy preserving data sharing among the users. In this paper, we present a novel approach to flexible data access control with re-encryption performed by the service provider. The basic design of this process is applying the two-level encryption on the data with access control. The service provider performs the second level encryption with user?s proxy key which is unique to the users. This approach provides the selective authorization on the encrypted data and also provides the flexible access control. Even though it has lot of proxy keys as much of users, no need of key distribution. And also, the user should remember only his secret key. In the end of this paper, we analyze and resolve the solutions for the possible attacks.
Authors and Affiliations
Muthuram R, Kousalya Dr. G
A Difference-Cum-Exponential Type Estimator for Estimating the Population Mean Under Stratification
In survey sampling, stratification is helpful in improving precision of estimators over simple random sampling in case of heterogeneous population. In the present paper, a difference-cum exponential type estimator of pop...
Construction of Graeco Sudoku Square Designs of Odd Orders
The Sudoku puzzle typically consists of a nine-by-nine grid, in which some of the spaces contain numbers; most of the spaces are blank. The goal is to fill in the blanks with digits from 1 to 9 so that each row, each col...
New Approach to Solve Fuzzy Linear Programming Problems by the Ranking Function
In this paper, a new method is proposed to find the fuzzy optimal solution of fully fuzzy linear programming problems with triangular fuzzy numbers. A computational method for solving fully fuzzy linear programming probl...
Conditional Variables Double Sampling Plan for Weibull Distributed Lifetimes under Sudden Death Testing
n this paper, we propose a conditional sampling plan called conditional double sampling plan for lot acceptance of parts whose life time follows a Weibull distribution with known shape parameter under sudden death testin...
Multi Scheduling Reactive Resource Sharing for Dynamic Dataflow in Cloud Environment
In recent years cloud parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for para...