Survey on Data Sharing and Re-Encryption in Cloud
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Cloud storage helps enterprises and government agencies significantly reduce their financial overhead of data management, since they can now archive their data backups remotely to third-party cloud storage providers rather than maintain data centers of their own. Security concerns become relevant as we outsource the storage of possibly sensitive data to third party cloud storage. Data stored in cloud may be unexpectedly disclosed in the future due to malicious attacks on the cloud or careless management of cloud operators. Secure data transfer is needed to maintain the data security between authorized users. The challenge of achieving secure data sharing is that we have to encrypt the data and at the same time it should be available to those authorized clients. This is made possible through re-encryption. The re-encryption process converts the ciphertext encrypted under the public key to a different cipher text encrypted under the intended receiver’s public key. The re-encryption is secure only if it does not produce plain text in any of its intermediate stages. The re-encrypting authority should never get any information about the secret keys or the plain text during the process.
Authors and Affiliations
Renjith P , Sabitha S
Enforcing Multi-user Security Policies in Cloud Computing
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...
ASHA: AGENT BASED SECURE HOST ARP CACHE MANAGEMENT
Host systems are exchange their IP-MAC pairs to establish communication. ARP (address resolution protocol) is maintains the IP-MAC pair of address of host in the cache table when the messages are receiving and send...
Cloud Computing: Migration from Traditional Systems to the Cloud
Over the past few decades Business organizations have tried hard to keep up with the changes encountered in the market. Various factors like increased load, security, availability, fail safe mechanisms etc. have...
A comparative study of Level II fuzzy sets and Type II fuzzy sets
This paper reviews and compares theories of level II fuzzy sets and type II fuzzy sets. Two approaches for the usefulness of level II fuzzy sets are reviewed one is in database modeling while other is in GIS. Type II...
Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance
—Digital Circuit Layout is a combinatorial optimization problem. Due to the complexity of integrated circuits, the first step in physical design is usually to divide a design into subdesigns. The work presents a br...