Secure Data Sharing Encryption Schemes in Cloud Storage: A Review  
  Authors : Shraddha Deshmukh; Prutha Sontakke; Mithil Wasnik

 

A model based on cloud computing wherein data is being accessed from the cloud and through the internet without any direct affiliation to the server. The services of cloud can be accessed as long as the internet service is accessed. In this paper, survey on many schemes like Key- Policy Attribute-Based coding, Cipher text- Policy Attribute- Based coding, Cipher text Policy Attribute Set primarily based coding, Fuzzy Identity-Based coding, gradable Identity-Based coding, gradable Attribute-Based Encryption and gradable Attribute-Set-Based Encryption for access management of outsourced information are mentioned.

 

Published In : IJCAT Journal Volume 3, Issue 3

Date of Publication : April 2016

Pages : 235-239

Figures :--

Tables : --

Publication Link :Secure Data Sharing Encryption Schemes in Cloud Storage: A Review

 

 

 

Shraddha Deshmukh : is currently in the final year of degree course of bachelor of engineering from Rajiv Gandhi College of engineering and Research, Wanadongri, Nagpur under Rashtrasant Tukdoji Maharaj Nagpur University.

Prutha Sontakke : is currently in the final year of degree course of bachelor of engineering from Rajiv Gandhi College of engineering and Research, Wanadongri, Nagpur under Rashtrasant Tukdoji Maharaj Nagpur University.

Mithil Wasnik : the guide and lecturer in Rajiv Gandhi College of engineering and Research, Wanadongri, Nagpur under Rashtrasant Tukdoji Maharaj Nagpur University.

 

 

 

 

 

 

 

Cloud Computing, Data Confidentiality, Fine- Grained Access Control.

This paper discusses the cloud storage system and the encryption techniques elaborately. Encryption techniques with makes the storage system more secure and as well as scalable. Implementation of an encryption system on the cloud storage is been done in order to achieve minimum storage and computation cost that provides the necessary impetus for research. Combination of centralized and decentralized storage systems existed in organizations.

 

 

 

 

 

 

 

 

 

[1] M. Nelson, “Building an Open Cloud,” Science. vol. 34 no. 5935 pp. 1656–1657, June 2009. [2] V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attibute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006. [3] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attribute based encryption,” in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2007. [4] R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc. ESORICS, Saint Malo, France, 2009. [5] A. Sahai and B. Waters, “Fuzzy identity based encryption,” in Proc. Acvances in Cryptology— Eurocrypt, 2005, vol. 3494, LNCS, pp. 457–473. [6] Yanli Ren and Dawu Gu,“Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model”in Proc. Informatica 32 (2008),pp 207–211. [7] G.Wang, Q. Liu, and J.Wu, “Hierachical attributebased encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010. [8] Zhiguo Wan, Jun’e Liu, and Robert H. Deng, Senior Member, IEEE, “HASBE: A Hierarchical Attribute- Based Solution for Flexible and Scalable Access Control in Cloud Computing”in Proc.IEEE Transactions on Information Forensics and Security, vol.7, No.2, April 2012. [9] S.G.Shini and K.Chitharanjan, “Secure Cloud based Medical Data exchange using Attribute based Encryption,” Special Issue of International Journal of Computer Applications on Advanced Computing and Communication Technologies for HPC Applications – ACCTHPCA, 2012. [10] Hsiao-Ying Lin and Wen-Guey Tzeng, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding,” IEEE Transactions on parallel and distributed systems, Volume 23, No.6, 2012. [11] B.Raja Sekhar, Sunil Kumar, L.Swathi Reddy and V.PoornaChandar, “CP-ABE Based Encryption for Secured Cloud Storage Acces,” International Journal of Scientific & Engineering Research, Volume 3, Issue 9, 2012. [12] K.Priyadarsini and C.Thirumalai selvan, “A Survey on Encryption Schemes for Data Sharing in Cloud Computing,” International Journal of Computer Science and Information Technology & Security (IJCSITS), Volume 2, No.5, 2012.