Secured File Sharing in Cloud Computing
Abstract
A secure data self-destruction scheme in cloud computing. create three way self-destruction scheme to secure the data using AES/DES to secure the data. By using this data will be securely self-destructed after a user-specified expiration time. Secondly, user can access data only one time from the cloud. At last, if the user enter the Incorrect key three times, then the data will be self-destructed.
Keywords
Full Text:
PDFReferences
B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditingfor shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–56, 2014.
R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,” Network, IEEE, vol. 28, no. 4, pp. 46–50, 2014.
P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” Cloud Computing, IEEE Transactions on, vol. 1, no. 2, pp. 142–157, 2013.
J.H.cheon,N.Hopper,”provably secure timed-release public key encryption,”ACM trans.INF.syst.security,vol.11,no.2,2008
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the 28th IEEE Symposium on Security and Privacy. IEEE, 2007, pp. 321– 334.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.