CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Securing Shared Data in Cloud Computing by using Cryptographic Schemes

by Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 14
Year of Publication: 2016
Authors: Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour
10.5120/ijca2016910942

Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour . Securing Shared Data in Cloud Computing by using Cryptographic Schemes. International Journal of Computer Applications. 146, 14 ( Jul 2016), 28-32. DOI=10.5120/ijca2016910942

@article{ 10.5120/ijca2016910942,
author = { Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour },
title = { Securing Shared Data in Cloud Computing by using Cryptographic Schemes },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 14 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number14/25467-2016910942/ },
doi = { 10.5120/ijca2016910942 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:28.121722+05:30
%A Ibtissam Ennajjar
%A Youness Tabii
%A Abdelhamid Benkaddour
%T Securing Shared Data in Cloud Computing by using Cryptographic Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 14
%P 28-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sharing data using cloud computing can be a good solution to profit from reduced costs, scalability, flexibility and more advantages that user can get from the cloud infrastructure. But when the object shared consists of sensitive or personnel data, the security concerns increase. Problems related to the lack of data confidentiality and integrity represent the number one problem encountered in cloud infrastructure and that restrains users and a number of organizations to benefit from the cloud’s services. In this paper we discuss the requirements needed to secure data in cloud environment and we propose a new approach to enhance the security of the data shared in cloud storage. Our method is based on cryptographic models. It is confidential, flexible and it reduces time of computation by adopting simple and efficient key management process and encryption schemes.

References
  1. D. Thilakanathan, S. Chen, S. Nepal and R. A. Calvo, ‘’Secure data sharing in the cloud,’’ Security, Privacy and Trust in Cloud Systems, chapter, Part 1, pp. 45-72, 2014
  2. M.Ali et al. ‘’SeDaSC: secure data sharing in clouds, ‘’ IEEE System Journal, 2015
  3. F. Jing-yi , H. Qin-long, M. Zhao-feng, Y. Yi-xian, ‘’Secure personal data sharing in cloud computing using attribute based broadcast encryption,’’ The Journal of China Universities of Posts and Telecommunications, Issue 6, pp -51,2014
  4. Z. Zhou , D. Huang, ‘’An efficient ciphertext-policy attribute based encryption and broadcast encryption’’, Proceedings of the 17th ACM conference on Computer nd communications security pp 753-755, 2010.
  5. S. lingwei, Y. Fang, Z. Ru, N. Xinxin, ‘’Method of secure, scalable, and fine-grained data access control with efficient revocation in untrusted cloud’’, The journal of China Universities of Posts and Telecommunications, Issue 2, pp 38-43, April 2015.
  6. J. Bethencourt, A. Sahai, B.Waters, ‘’Ciphertext-policy attribute based encryption’’, Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp 321-334.
  7. N. S. Kumar, G.V. Rajya Lakshmi, B. Balamurugan, ‘’enhanced attribute based encryption for cloud computing,’’ , Procedia Computer Science, Volume 46, 2015, Pages 689–696
  8. D.Tiwari, G. Gangadharan, ‘’Secure sharing of data in cloud computing’’, Security in Computing and Communications,pp 24-35, 2015.
  9. G.Wei, R.Lu, J.Shao, ‘’EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption’’ Journal of Computer and System Sciences, Volume 80 Issue 8, December, 2014, Pages 1549-1562.
  10. X. Dong et al, ‘’Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing’’, Computers & Security(2014), pp 1-14.
  11. B.Suzie, A. Reiter, F. Reimair, D. Venturi, B. Kubo, “Secure data sharing and processing in heterogeneous clouds,” , Procedia Computer Science 68 (2015), pp 116-126.
  12. A. Balu , K. Kuppusamy, ‘’An expressive and provably secure Ciphertext-Policy attribute based encryption’’, Information Sciences: an International Journal, Vol 276 issue C, August 2014, pp 354-362
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Data Sharing Cryptography Cloud Storage.