Open Access   Article Go Back

A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM)

Nagaraju. P1 , Nagamalleswara Rao.N2 , Vinod Kumar .Ch.R3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 302-309, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.302309

Online published on Jul 31, 2018

Copyright © Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R, “A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM),” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.302-309, 2018.

MLA Style Citation: Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R "A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM)." International Journal of Computer Sciences and Engineering 6.7 (2018): 302-309.

APA Style Citation: Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R, (2018). A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM). International Journal of Computer Sciences and Engineering, 6(7), 302-309.

BibTex Style Citation:
@article{P_2018,
author = { Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R},
title = {A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {302-309},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2433},
doi = {https://doi.org/10.26438/ijcse/v6i7.302309}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.302309}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2433
TI - A Privacy Preserving cloud Storage Framework by using Server Re-encryption Mechanism (SRM)
T2 - International Journal of Computer Sciences and Engineering
AU - Nagaraju. P, Nagamalleswara Rao.N, Vinod Kumar .Ch.R
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 302-309
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
593 397 downloads 274 downloads
  
  
           

Abstract

Cloud computing is an emerging technology the way that organizations manage their data, owing to its attractive features such as robustness, low cost, and ubiquitous nature. However, privacy concerns arise whenever sensitive data is out-sourced to the cloud where the data is processed and stored. The fact that users no longer have physical possession of the outsourced data makes it a formidable task to achieve the data confidentiality and integrity. As the data, in most cases encrypted, have to be not only stored, but also processed in clouds, the cryptography-based data confidentiality and integrity protection approaches are not adequate to satisfy the security requirements. Proxy re-encryption serves as a promising solution to secure the data sharing in the cloud computing. It enables a data owner to encrypt shared data in cloud under its own public key, which is further transformed by a semi-trusted cloud server into an encryption intended for the legitimate recipient for access control. To achieve a flexible and fine-grained access control on the outsourced data in cloud environment, in this paper we design a functional encryption system.

Key-Words / Index Term

Cloud Computing Component, Privacy-Preserving methods, Privacy-Preserving Algorithms

References

[1] Wang J, Zhao Y et al, “Providing Privacy Preserving in cloud computing”, International Conference on Test and Measurement, vol 2(2009), 213–216.
[2] Greveler U, Justus b et al., “A Privacy Preserving System for Cloud Computing”, 11th IEEE International Conference on Computer and Information Technology, 648–653(2011).
[3] G. Ateniese, K. Benson, and S. Hohenberger, “KeyPrivate Proxy Re-Encryption”, Proc. Topics in Cryptology, 2009, pp. 279-294.
[4] Assad Abbas and Samee U. Khan, Senior Member, IEEE,
“A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds”, IEEE journal of biomedical and health informatics, vol. 18, no. 4, july 2014.
[5] Zhiguang Qin , Hu Xiong, Shikun Wu, and Jennifer Batamuliza, “A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing”, JOURNAL OF L ATEX CLASS FILES, VOL. 13, NO. 9, SEPTEMBER 2014.
[6] P. Angin et al., “An entity-centric approach for privacy and identity management in cloud computing,” in Reliable Distributed Systems, 201029th IEEE Symposium on, New Delhi, IEEE. 2010, pp. 177–183.
[7] Zhou M, Mu Y et al, ”Privacy-Preserved Access Control 3. for Cloud Computing”, International Joint Conference of IEEE TrustCom-11/IEEE ICESS- 11/FCST-11, 83–90(2011).
[8] Mu, Y., Varadharajan, V., and Nguyen, K. Q. (1999) “Delegated Decryption”, Proceedings of the 7th IMA International Conference on Cryptography and Coding, Cirencester, UK, pp.258-269.
[9] Amazon Elastic Computer Cloud (EC2). http://aws.amazon.com/ec2/
[10] Amazon Simple Storage Service (S3). http://aws.amazon.com/s3/
[11] RuWei Huang, Si Yu, Wei Zhuang, XiaoLin Gui, Design of Privacy-Preserving Cloud Storage Framework, 2010 Ninth International Conference on Grid and Cloud Computing
[12] Yu, S., Wang, C., Ren, K., Lou W, “Achieving secure, scalable, and fine-granied data access control in cloud computing”, INFOCOM’10: 29th IEEE international conference on computer communications, San Diego, CA, USA, pp, 534-542(2010).
[13] W. Sharon Inbarani , G. Shenbagamoorthy, C. Kumar Charlie Paul, “Proxy Re-encryption Schemes for Data Storage Security in Cloud- A Survey”, International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 1, January- 2013 ISSN: 2278-0181.
[14] Nagaraju.P,Nagamalleswara rao .N.,” A Detailed Study of Security Aspects in Cloud Computing”, International Journal of Emerging Technologies in Engineering Research (IJETER),Volume 4, Issue 6, June (2016).