Skip to main content
Top

2020 | OriginalPaper | Chapter

Proof of Shared Ownerships and Construct A Collaborative Cloud Application

Authors : S. Ganesh Velu, C. Gopala Krishnan, K. Sivakumar, J. A. Jevin

Published in: Intelligent Communication Technologies and Virtual Mobile Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Distributed storage stages guarantee advantageous applications to clients for sharing records and cooperate with coordinated efforts. The main challenge in a shared cloud-based application is the security and privacy of sensitive information stored by a particular user. For instance, Cloud users has the ability to erase documents and disavow them without counselling the alternate cloud associates. To handle this drawback, Proof of Shared belonging (PoSW) is proposed, a particular PoSW is subjected to execute information protection mechanism, confirmation and information reduplication. Furthermore, PoSW tends to utilize the diagonal cryptography equation to ensure the security of the mutual data records in order to provide a common information sharing approval, document ownership, and develop an absolutely particular relation between the document holders. Hence, integrating PoSW into the cloud server assists it to check the common belonging and overcome the data reduplication challenges in the common cloud-based data records.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Charnes, C., Pieprzyk, J., Safavi-Naini, R.: Conditionally secure secret sharing schemes with disenrollment capability. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–95 (1994) Charnes, C., Pieprzyk, J., Safavi-Naini, R.: Conditionally secure secret sharing schemes with disenrollment capability. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–95 (1994)
3.
go back to reference Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP (2000) Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP (2000)
4.
go back to reference Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., Wattenhofer, R.: FARSITE: federated, available, and reliable storage for an incompletely trusted environment. In: OSDI, pp. 1–14, December 2002 Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., Wattenhofer, R.: FARSITE: federated, available, and reliable storage for an incompletely trusted environment. In: OSDI, pp. 1–14, December 2002
5.
go back to reference McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proceedings of SP2002 (2002) McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proceedings of SP2002 (2002)
6.
go back to reference Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of SP2003 (2003) Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of SP2003 (2003)
7.
go back to reference Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proceedings of FAST2003 (2003) Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proceedings of FAST2003 (2003)
8.
go back to reference Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: 2004 Proceedings of 11th ACM Conference on Computer Communication Security, pp. 354–363 (2004) Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: 2004 Proceedings of 11th ACM Conference on Computer Communication Security, pp. 354–363 (2004)
9.
go back to reference Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of CCS2005 (2005) Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of CCS2005 (2005)
10.
go back to reference Rivest, R.L.: All-or-nothing encryption and the package transform. In: International Workshop on Fast Software Encryption (FSE), pp. 210–218 (1997)CrossRef Rivest, R.L.: All-or-nothing encryption and the package transform. In: International Workshop on Fast Software Encryption (FSE), pp. 210–218 (1997)CrossRef
11.
go back to reference Waters, B.: Efficient identity-based encryption without random oracles. In; 2005 Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 114–127 (2005) Waters, B.: Efficient identity-based encryption without random oracles. In; 2005 Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 114–127 (2005)
12.
go back to reference di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of VLDB2007 (2007) di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of VLDB2007 (2007)
14.
go back to reference Sterling, T., Stark, D.A.: High-performance computing forecast: Partly cloudy. Comput. Sci. Eng. 11(4), 42–49 (2009)CrossRef Sterling, T., Stark, D.A.: High-performance computing forecast: Partly cloudy. Comput. Sci. Eng. 11(4), 42–49 (2009)CrossRef
15.
go back to reference Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: 2012 Proceedings 32nd Annual Cryptology Conference of Advanced Cryptology, pp. 199–217 (2012) Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: 2012 Proceedings 32nd Annual Cryptology Conference of Advanced Cryptology, pp. 199–217 (2012)
16.
go back to reference Nieto, J.M.G., Manulis, M., Sun, D.: Forward-secure hierarchical predicate encryption. In: 2013 Proceedings of 5th International Conference on Pairing-Based Cryptography—Pairing, pp. 83–101 (2013) Nieto, J.M.G., Manulis, M., Sun, D.: Forward-secure hierarchical predicate encryption. In: 2013 Proceedings of 5th International Conference on Pairing-Based Cryptography—Pairing, pp. 83–101 (2013)
Metadata
Title
Proof of Shared Ownerships and Construct A Collaborative Cloud Application
Authors
S. Ganesh Velu
C. Gopala Krishnan
K. Sivakumar
J. A. Jevin
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_51