Skip to main content
Top

2020 | OriginalPaper | Chapter

Identity Based Reliable Data Sharing with Revoked System in Cloud

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In cloud storage services, users can store their data remotely on the cloud and exchange data with others. The cloud files consist of sensitive information. At the time of file sharing, may realizing the sensitive information of files hide, but this shared file cannot be used by others. The problem is to how to perform data sharing with sensitive information. To solve this problem, propose a Revocation algorithm to avoid the use of sensitive files from unauthorized users. In the system first, The system sanitizes the data blocks and data blocks corresponding to the organization’s sensitive information, sanitizes the sanitized data blocks signatures, and finally, sanitizers the sanitized files and their corresponding signatures in the cloud. These signatures are used to verify the integrity of files sanitized during the integrity audit phase. TPA then checks the integrity of the disinfected file. In this way, we are provide security for sharing data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yu, J., Shen, W., Qin, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and datasharing with sensitive information hiding for secure cloud storage (2018) Yu, J., Shen, W., Qin, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and datasharing with sensitive information hiding for secure cloud storage (2018)
2.
go back to reference Zhang, H., Lu, X., Shen, W., Xia, H., Yu, J., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium (2017) Zhang, H., Lu, X., Shen, W., Xia, H., Yu, J., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium (2017)
3.
go back to reference Ren, K., Wang, C., Yu, J., Varadharajan, V.: Enabling cloud storage auditing with key-exposure resistance. IEEE (2015) Ren, K., Wang, C., Yu, J., Varadharajan, V.: Enabling cloud storage auditing with key-exposure resistance. IEEE (2015)
4.
go back to reference Ren, K., Yu, J., Wang, C.: Enabling cloud storage auditing with verifiable outsourcing of key updates (2016) Ren, K., Yu, J., Wang, C.: Enabling cloud storage auditing with verifiable outsourcing of key updates (2016)
5.
go back to reference Shen, W., Yang, G., Su, Q., Fu, Z., Yu, J., Hao, R.: enabling public auditing for shared data in cloud storage supporting identity privacy and traceability (2016) Shen, W., Yang, G., Su, Q., Fu, Z., Yu, J., Hao, R.: enabling public auditing for shared data in cloud storage supporting identity privacy and traceability (2016)
6.
go back to reference Li, B., Wang, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud (2015) Li, B., Wang, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud (2015)
7.
go back to reference Wang, D., Xu, M., Fu, S., Luo, Y., Deng, J.: Efficient integrity auditing for shared data in the cloud with secure user revocation (2015) Wang, D., Xu, M., Fu, S., Luo, Y., Deng, J.: Efficient integrity auditing for shared data in the cloud with secure user revocation (2015)
8.
go back to reference He, D., Wang, H., Tang, S.: identity-based proxy oriented data uploading and remote data integrity checking in public cloud (2016) He, D., Wang, H., Tang, S.: identity-based proxy oriented data uploading and remote data integrity checking in public cloud (2016)
9.
go back to reference Xie, D., Li, J., Li, J., Cai, Z.: Secure auditing and deduplicating data in cloud (2016) Xie, D., Li, J., Li, J., Cai, Z.: Secure auditing and deduplicating data in cloud (2016)
10.
go back to reference Koo, D., Hur, J., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage (2016) Koo, D., Hur, J., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage (2016)
11.
go back to reference Dhivya, J., Aanjan Kumar, S.: Efficient cloud data sharing with strong key analysis using intelligent crypto system. Int. J. Innov. Res. Comput. Commun. Eng. (2018) Dhivya, J., Aanjan Kumar, S.: Efficient cloud data sharing with strong key analysis using intelligent crypto system. Int. J. Innov. Res. Comput. Commun. Eng. (2018)
12.
go back to reference Prasanna, A.H.N.V.L., Surya Ram Prasad, K., Suri Babu, D.D.D.: Simple protocol to restrict client key exposure over cloud storage systems for auditing. Int. Res. J. Eng. Technol. (IRJET) (2016) Prasanna, A.H.N.V.L., Surya Ram Prasad, K., Suri Babu, D.D.D.: Simple protocol to restrict client key exposure over cloud storage systems for auditing. Int. Res. J. Eng. Technol. (IRJET) (2016)
Metadata
Title
Identity Based Reliable Data Sharing with Revoked System in Cloud
Authors
Sneha D. Raut
Nagaraju Bogiri
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37051-0_93