Skip to main content

2020 | OriginalPaper | Buchkapitel

Proof of Shared Ownerships and Construct A Collaborative Cloud Application

verfasst von : S. Ganesh Velu, C. Gopala Krishnan, K. Sivakumar, J. A. Jevin

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Distributed storage stages guarantee advantageous applications to clients for sharing records and cooperate with coordinated efforts. The main challenge in a shared cloud-based application is the security and privacy of sensitive information stored by a particular user. For instance, Cloud users has the ability to erase documents and disavow them without counselling the alternate cloud associates. To handle this drawback, Proof of Shared belonging (PoSW) is proposed, a particular PoSW is subjected to execute information protection mechanism, confirmation and information reduplication. Furthermore, PoSW tends to utilize the diagonal cryptography equation to ensure the security of the mutual data records in order to provide a common information sharing approval, document ownership, and develop an absolutely particular relation between the document holders. Hence, integrating PoSW into the cloud server assists it to check the common belonging and overcome the data reduplication challenges in the common cloud-based data records.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Charnes, C., Pieprzyk, J., Safavi-Naini, R.: Conditionally secure secret sharing schemes with disenrollment capability. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–95 (1994) Charnes, C., Pieprzyk, J., Safavi-Naini, R.: Conditionally secure secret sharing schemes with disenrollment capability. In: ACM Conference on Computer and Communications Security (CCS), pp. 89–95 (1994)
3.
Zurück zum Zitat Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP (2000) Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.: Scalable secure storage when half the system is faulty. In: ICALP (2000)
4.
Zurück zum Zitat Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., Wattenhofer, R.: FARSITE: federated, available, and reliable storage for an incompletely trusted environment. In: OSDI, pp. 1–14, December 2002 Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., Wattenhofer, R.: FARSITE: federated, available, and reliable storage for an incompletely trusted environment. In: OSDI, pp. 1–14, December 2002
5.
Zurück zum Zitat McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proceedings of SP2002 (2002) McDaniel, P.D., Prakash, A.: Methods and limitations of security policy reconciliation. In: Proceedings of SP2002 (2002)
6.
Zurück zum Zitat Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of SP2003 (2003) Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of SP2003 (2003)
7.
Zurück zum Zitat Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proceedings of FAST2003 (2003) Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Scalable secure file sharing on untrusted storage. In: Proceedings of FAST2003 (2003)
8.
Zurück zum Zitat Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: 2004 Proceedings of 11th ACM Conference on Computer Communication Security, pp. 354–363 (2004) Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In: 2004 Proceedings of 11th ACM Conference on Computer Communication Security, pp. 354–363 (2004)
9.
Zurück zum Zitat Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of CCS2005 (2005) Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of CCS2005 (2005)
10.
Zurück zum Zitat Rivest, R.L.: All-or-nothing encryption and the package transform. In: International Workshop on Fast Software Encryption (FSE), pp. 210–218 (1997)CrossRef Rivest, R.L.: All-or-nothing encryption and the package transform. In: International Workshop on Fast Software Encryption (FSE), pp. 210–218 (1997)CrossRef
11.
Zurück zum Zitat Waters, B.: Efficient identity-based encryption without random oracles. In; 2005 Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 114–127 (2005) Waters, B.: Efficient identity-based encryption without random oracles. In; 2005 Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 114–127 (2005)
12.
Zurück zum Zitat di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of VLDB2007 (2007) di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of VLDB2007 (2007)
14.
Zurück zum Zitat Sterling, T., Stark, D.A.: High-performance computing forecast: Partly cloudy. Comput. Sci. Eng. 11(4), 42–49 (2009)CrossRef Sterling, T., Stark, D.A.: High-performance computing forecast: Partly cloudy. Comput. Sci. Eng. 11(4), 42–49 (2009)CrossRef
15.
Zurück zum Zitat Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: 2012 Proceedings 32nd Annual Cryptology Conference of Advanced Cryptology, pp. 199–217 (2012) Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: 2012 Proceedings 32nd Annual Cryptology Conference of Advanced Cryptology, pp. 199–217 (2012)
16.
Zurück zum Zitat Nieto, J.M.G., Manulis, M., Sun, D.: Forward-secure hierarchical predicate encryption. In: 2013 Proceedings of 5th International Conference on Pairing-Based Cryptography—Pairing, pp. 83–101 (2013) Nieto, J.M.G., Manulis, M., Sun, D.: Forward-secure hierarchical predicate encryption. In: 2013 Proceedings of 5th International Conference on Pairing-Based Cryptography—Pairing, pp. 83–101 (2013)
Metadaten
Titel
Proof of Shared Ownerships and Construct A Collaborative Cloud Application
verfasst von
S. Ganesh Velu
C. Gopala Krishnan
K. Sivakumar
J. A. Jevin
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_51