Secure Data Sharing Using Cryptography in Cloud Environment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract : Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control over own data because data controlled by the third party called cloud service providers (CSP). Data security is challenging problem when data owner shares own data to another known as data sharer on cloud. Many researchers have addressed this issue by cryptography with different encryption schemes that provides secure data sharing on cloud. Here, we propose system model for secure data sharing on cloud with intension to provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption by users, support dynamically changes of users membership and owner should not be always online when the user wants to access the data.
Authors and Affiliations
Anjali Patel , Nimisha Patel , Dr. Hiren Patel
The Cyberspace: Redefining A New World
Abstract: The cyberspace driven by information systems and the Internet is transforming our environment inextraordinary ways by enabling economic growth and providing new means by which people connect, interactand collab...
Big Data in Bioinformatics & the Era of Cloud Computing
With the recent breakthrough in bioinformatics, demand of more storage space is increasing day by day. With this exponentially increasing data i.e. the big data of bioinformatics sector, the data needs to be hand...
Web Data mining-A Research area in Web usage mining
Data mining technology has emerged as a means for identifying patterns and trends from large quantities of data. The data mining technology normally adopts data integration method to generate data warehouse, on...
Secure Transmission of Record after Record Linkage for Crime Detection Using AES
Abstract:In many applications like crime detection, health sector, taxation sector etc… record linkage is used to find out the matched data items from different data sources. Finding matched records from different...
Level of Interleukin 8 and Alpha -1 Antitrypsin in CerebroSpinal Fuid of Iraqi Patient with Bacterial and Viral Meniningitis
Objective: Meningitis refers to inflammation of the leptomeninges, the connective tissue layers in closest proximity to the surface of the brain. Meningitis can be caused by bacteria, viruses, parasites, and fungi, as we...