Survey on Data Sharing and Re-Encryption in Cloud 

Abstract

Cloud storage helps enterprises and government agencies significantly reduce their financial overhead of data management, since they can now archive their data backups remotely to third-party cloud storage providers rather than maintain data centers of their own. Security concerns become relevant as we outsource the storage of possibly sensitive data to third party cloud storage. Data stored in cloud may be unexpectedly disclosed in the future due to malicious attacks on the cloud or careless management of cloud operators. Secure data transfer is needed to maintain the data security between authorized users. The challenge of achieving secure data sharing is that we have to encrypt the data and at the same time it should be available to those authorized clients. This is made possible through re-encryption. The re-encryption process converts the ciphertext encrypted under the public key to a different cipher text encrypted under the intended receiver’s public key. The re-encryption is secure only if it does not produce plain text in any of its intermediate stages. The re-encrypting authority should never get any information about the secret keys or the plain text during the process. 

Authors and Affiliations

Renjith P , Sabitha S

Keywords

Related Articles

Enforcing Multi-user Security Policies in Cloud Computing

The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...

ASHA: AGENT BASED SECURE HOST ARP CACHE MANAGEMENT 

Host systems are exchange their IP-MAC pairs to establish communication. ARP (address resolution protocol) is maintains the IP-MAC pair of address of host in the cache table when the messages are receiving and send...

Cloud Computing: Migration from Traditional Systems to the Cloud 

Over the past few decades Business organizations have tried hard to keep up with the changes encountered in the market. Various factors like increased load, security, availability, fail safe mechanisms etc. have...

A comparative study of Level II fuzzy sets and Type II fuzzy sets  

This paper reviews and compares theories of level II fuzzy sets and type II fuzzy sets. Two approaches for the usefulness of level II fuzzy sets are reviewed one is in database modeling while other is in GIS. Type II...

Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance 

—Digital Circuit Layout is a combinatorial optimization problem. Due to the complexity of integrated circuits, the first step in physical design is usually to divide a design into subdesigns. The work presents a br...

Download PDF file
  • EP ID EP146610
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Renjith P, Sabitha S (2013). Survey on Data Sharing and Re-Encryption in Cloud . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 477-480. https://europub.co.uk/articles/-A-146610