Open Access   Article Go Back

Secured Data Sharing in Clouds

Sowmya Sundari L K1 , Pallavi K R2 , P. Bhavya Shree3 , P. Lakshmi Viharika4 , R. Hari Chandana5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 214-217, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.214217

Online published on May 15, 2019

Copyright © Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana, “Secured Data Sharing in Clouds,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.214-217, 2019.

MLA Style Citation: Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana "Secured Data Sharing in Clouds." International Journal of Computer Sciences and Engineering 07.14 (2019): 214-217.

APA Style Citation: Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana, (2019). Secured Data Sharing in Clouds. International Journal of Computer Sciences and Engineering, 07(14), 214-217.

BibTex Style Citation:
@article{K_2019,
author = {Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana},
title = {Secured Data Sharing in Clouds},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {214-217},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1124},
doi = {https://doi.org/10.26438/ijcse/v7i14.214217}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.214217}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1124
TI - Secured Data Sharing in Clouds
T2 - International Journal of Computer Sciences and Engineering
AU - Sowmya Sundari L K, Pallavi K R, P. Bhavya Shree, P. Lakshmi Viharika, R. Hari Chandana
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 214-217
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud cache is a use of mists that release associations from developing administrative information stockpiling frameworks. Be that as it may, distributed storage offers ascend to security concerns. If there should arise an occurrence of gathering shared information, the information faces particular cloud and ordinary insider dangers. Protect information distribution in a gathering conflict inside dangers vindictive clients is an essential analysis problem. We propose this system,which gives: 1) info hiding and trustworthiness; 2) get to control; 3) info distribution without utilizing register serious reencryption; 4) internal danger security; and 5) forward and in reverse access control. The Secure information partaking in cloud approach encodes a folder with a key with solitary encryption. Two diverse key offers for every client are created, with client just having one offer. The ownership of a solitary offer of a key enables this strategy to counter the insider dangers. The alternative key offer is put away by a confided in outsider, which is known as the cryptographic server. This philosophy is relevant to customary and portable distributed estimating situations.

Key-Words / Index Term

Access control, distributed computing, abnormal state Petri nets, displaying, Satisfiability Modulo Theory, Scythe.

References

[1] K. Alhamazani et al., “An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art,” Computing, DOI: 10.1007/s00607-014-0398-5, 2014, to be published.
[2] A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Future Gen. Comput. Syst.,
[3] A. Abbas and S. U. Khan, “A review on the State-of-the-art privacy preserving approach esine-health clouds,IEEEJ. Biomed. HealthInformat., vol. 18, no. 1, pp. 1431–1441, Jul. 2014.