Open Access Open Access  Restricted Access Subscription or Fee Access

Secured File Sharing in Cloud Computing

M. Deepak, C. Mathan Kumar, D. Suganya

Abstract


A secure data self-destruction scheme in cloud computing. create three way self-destruction scheme to secure the data using AES/DES to secure the data. By using this data will be securely self-destructed after a user-specified expiration time. Secondly, user can access data only one time from the cloud. At last, if the user enter the Incorrect key three times, then the data will be self-destructed.


Keywords


Sensitive Data, Assured Deletion, Fine Grained Access Control, Privacy Preserving, Cloud Computing

Full Text:

PDF

References


B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditingfor shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–56, 2014.

R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,” Network, IEEE, vol. 28, no. 4, pp. 46–50, 2014.

P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” Cloud Computing, IEEE Transactions on, vol. 1, no. 2, pp. 142–157, 2013.

J.H.cheon,N.Hopper,”provably secure timed-release public key encryption,”ACM trans.INF.syst.security,vol.11,no.2,2008

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the 28th IEEE Symposium on Security and Privacy. IEEE, 2007, pp. 321– 334.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.