Cryptographic File System for Secured Group Communication
Blessy Paul V1 , Ms. Jibi K George2
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-5 , Page no. 207-211, May-2015
Online published on May 30, 2015
Copyright © Blessy Paul V , Ms. Jibi K George . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Blessy Paul V , Ms. Jibi K George , “Cryptographic File System for Secured Group Communication,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.207-211, 2015.
MLA Style Citation: Blessy Paul V , Ms. Jibi K George "Cryptographic File System for Secured Group Communication." International Journal of Computer Sciences and Engineering 3.5 (2015): 207-211.
APA Style Citation: Blessy Paul V , Ms. Jibi K George , (2015). Cryptographic File System for Secured Group Communication. International Journal of Computer Sciences and Engineering, 3(5), 207-211.
BibTex Style Citation:
@article{V_2015,
author = {Blessy Paul V , Ms. Jibi K George },
title = {Cryptographic File System for Secured Group Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {207-211},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=505},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=505
TI - Cryptographic File System for Secured Group Communication
T2 - International Journal of Computer Sciences and Engineering
AU - Blessy Paul V , Ms. Jibi K George
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 207-211
IS - 5
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2304 | 2328 downloads | 2378 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Cloud computing is the delivery of computing and storage capacity as a service to users. The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided by cloud services is questionable. Users, after uploading their files, have no control anymore about the way their data is handled and the location where it is stored. Considering both corporate and personal data which is often secret and sensitive in nature, one should not blindly entrust it to a cloud storage provider. In order to ensure the confidentiality of date during transferring it to the cloud storage, we need some encryption techniques. In this paper, we present a cryptographic file system based on Multiple-Key Public-Key Cryptography which is designed for enhancing the cloud data storage security for an organization. Here, files are encrypted by the administrator of the organization before they are uploaded to the cloud storage providers. Therefore, the cloud storage providers can’t access the users’ data. This encryption technique also allows the sharing files within a group of users of an organization. A key feature is that it handles changes in group membership and modification of files in an extremely efficient manner, by using the same encryption method.
Key-Words / Index Term
Dynamic Membership, Multiple Key public key Cryptography, Cloud Storage
References
[1] Istv´An L´Am., Szilveszter Szebeni., Levente Butty., (2012), “Tresorium: Cryptographic File System For Dynamic Groups Over Untrusted Cloud Storage”, Proceedings of the 41st International Conference on Parallel Processing 14, pp.1594–1603.
[2] Peng Yong., Zhao Wei., Xie Feng., Dai Zhong-Hua., Gao Yang., Chen Dong-Qing.,(2012), ”Secure Cloud Storage Based On Cryptographic Techniques” Proceedings of the IEEE INFOCOM, 14, pp.1594–1603.
[3] I. Lam., S. Szebeni., And L. Buttyan., (2012) “Invitation-Oriented Tgdh: Keymanagement For Dynamic Groups In An Asynchronous Communication Model,” In Submitted To 4th International Workshop On Security In Cloud Computing, 15, 17, PP.1684–1695
[4] V. Sriram., G. Narayan,, and K. Gopinath,, (2007) “SAFIUS - A secure and accountable filesystem over untrusted storage,” In Storage Workshop, 2007. SISW ’07. Fourth International IEEE, pp. 34–45.
[5] D. Grolimund., L. Meisser., S. Schmid., and R. Wattenhofer.,(2006) “Cryptree:A folder tree structure for cryptographic file systems,” In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 189–198.