Result Analysis of Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

The Benefited from Cloud Computing, clients can do a flourishing and moderate methodology for data sharing among gathering individuals within the cloud with the characters of low maintenance and small administration price. , we should always offer security guarantees for the sharing data files since they're outsourced. Unfortunately, due to the frequent modification of the attachment, allocation data whereas as long as privacy-preserving is still a difficult issue, especially for an untrusted cloud owed to the collusion hit. Moreover, for existing schemes, the security of key distribution depends on the secure line, however, to have such channel could be a strong assumption and is tough for practice. Finally, our theme can succeed fine efficiency, which implies that previous users needn't to update their personal keys for matters either a replacement user joins within the group or a user is revoked from the group.

[1]  Rui Jiang,et al.  A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[2]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[3]  Elisa Bertino,et al.  Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.

[4]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[5]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[6]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[7]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[10]  T. Vijayalakshmi,et al.  Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2015 .

[11]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .

[13]  Hovav Shacham,et al.  SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.

[14]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[15]  Bert den Boer Diffie-Hellman is as Strong as Discrete Log for Certain Primes , 1988, CRYPTO.