Open Access   Article Go Back

Cryptographic File System for Secured Group Communication

Blessy Paul V1 , Ms. Jibi K George2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 207-211, May-2015

Online published on May 30, 2015

Copyright © Blessy Paul V , Ms. Jibi K George . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Blessy Paul V , Ms. Jibi K George , “Cryptographic File System for Secured Group Communication,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.207-211, 2015.

MLA Style Citation: Blessy Paul V , Ms. Jibi K George "Cryptographic File System for Secured Group Communication." International Journal of Computer Sciences and Engineering 3.5 (2015): 207-211.

APA Style Citation: Blessy Paul V , Ms. Jibi K George , (2015). Cryptographic File System for Secured Group Communication. International Journal of Computer Sciences and Engineering, 3(5), 207-211.

BibTex Style Citation:
@article{V_2015,
author = {Blessy Paul V , Ms. Jibi K George },
title = {Cryptographic File System for Secured Group Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {207-211},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=505},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=505
TI - Cryptographic File System for Secured Group Communication
T2 - International Journal of Computer Sciences and Engineering
AU - Blessy Paul V , Ms. Jibi K George
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 207-211
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2304 2328 downloads 2378 downloads
  
  
           

Abstract

Cloud computing is the delivery of computing and storage capacity as a service to users. The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided by cloud services is questionable. Users, after uploading their files, have no control anymore about the way their data is handled and the location where it is stored. Considering both corporate and personal data which is often secret and sensitive in nature, one should not blindly entrust it to a cloud storage provider. In order to ensure the confidentiality of date during transferring it to the cloud storage, we need some encryption techniques. In this paper, we present a cryptographic file system based on Multiple-Key Public-Key Cryptography which is designed for enhancing the cloud data storage security for an organization. Here, files are encrypted by the administrator of the organization before they are uploaded to the cloud storage providers. Therefore, the cloud storage providers can’t access the users’ data. This encryption technique also allows the sharing files within a group of users of an organization. A key feature is that it handles changes in group membership and modification of files in an extremely efficient manner, by using the same encryption method.

Key-Words / Index Term

Dynamic Membership, Multiple Key public key Cryptography, Cloud Storage

References

[1] Istv´An L´Am., Szilveszter Szebeni., Levente Butty., (2012), “Tresorium: Cryptographic File System For Dynamic Groups Over Untrusted Cloud Storage”, Proceedings of the 41st International Conference on Parallel Processing 14, pp.1594–1603.
[2] Peng Yong., Zhao Wei., Xie Feng., Dai Zhong-Hua., Gao Yang., Chen Dong-Qing.,(2012), ”Secure Cloud Storage Based On Cryptographic Techniques” Proceedings of the IEEE INFOCOM, 14, pp.1594–1603.
[3] I. Lam., S. Szebeni., And L. Buttyan., (2012) “Invitation-Oriented Tgdh: Keymanagement For Dynamic Groups In An Asynchronous Communication Model,” In Submitted To 4th International Workshop On Security In Cloud Computing, 15, 17, PP.1684–1695
[4] V. Sriram., G. Narayan,, and K. Gopinath,, (2007) “SAFIUS - A secure and accountable filesystem over untrusted storage,” In Storage Workshop, 2007. SISW ’07. Fourth International IEEE, pp. 34–45.
[5] D. Grolimund., L. Meisser., S. Schmid., and R. Wattenhofer.,(2006) “Cryptree:A folder tree structure for cryptographic file systems,” In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 189–198.