Professional Documents
Culture Documents
www.iaetsd.in
sharing,
privacy-
1. INTRODUCTION
Cloud Computing is recognized as an alternative to
traditional information technology due to its intrinsic resource
sharing and low-maintenance characteristics. In cloud
computing ,the cloud service provider(CSPs),such as Amazon,
are able to deliver various services to cloud users with the
help of powerful datacenters. By migrating the local data
management systems into cloud servers, users can enjoy highquality services and save significant investments on their local
infrastructures.
1
www.iaetsd.in
Any user in the group can store and share data files
with others by the cloud.
2.
3.
4.
www.iaetsd.in
www.iaetsd.in
1.
2.
3.
4.
4.4 USER AUTHENTICATION:In this module, the user is allowed to access the
information from the Cloud Server. When a user registers in
cloud, private key and public key will be generated for that
user by cloud server. If user wants to view his own file, he
uses private key. If user wants to view others file, he uses
public key. This public key is split up equally for verification
by data owners. Each part of the public key is verified by data
owners. After verifying the key, if the key is valid, then user is
allowed to access the data. If the key is invalid, then the user is
rejected to access the data by Cloud Service Provider.
We consider a cloud computing architecture by combining
with an example that a company uses a cloud to enable its
staffs in the same group or department to share files. The
system model consists of three different entities: the cloud, a
group manager (i.e., the company manager), and a large
ISBN NO : 978 - 1502893314
www.iaetsd.in
6. REFERENCES
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger (2005),
Improved Proxy Re- Encryption Schemes with Applications
to secure Distributed Storage, Proc. Network and Distributed
Systems Security Symp. (NDSS), pp. 29-43
[2] G. Ateniese, R. Burns, R.Curtmola, J. Herring, L. Kissner,
Z. Peterson, and D. Song, Provable Data Possession at
Untrusted stores, proc. 14th ACM Conf. Computer and
Comm. Security (CSS 07), pp. 598-609
[3] K.D. Bowers, A.Juels, and A.Oprea (2009), HAIL: A
High-Availability and Integrity Layer for Cloud Storage,
Proc.ACM Conf. Computer and Comm. Security (CCS 09),
pp. 187-198
[4] A. Fiat and M.Naor (1993),Broadcast Encryption, proc.
Intl Cryptology Conf. Advances in Cryptology(CRYPTO),
pp.480-491.
[5] E.Goh, H. Shacham, N. Modadugu,and D.Boneh (2003),
Sirius: Securing Remote Untrusted Storage, Proc. Network
and Distributed Systems Security Symp. (NDSS), pp. 131145.
[6] M.Kallahalla,E.Riedel,R. Swaminathan, Q. Wang, and K.
Fu (2003), Plutus: Scalable Secure File Sharing on Untrusted
storage, Proc.USENIX Conf. File and Storage Technologies,
pp. 29-42.
[7] X. Liu, Y. Zhang, B. Wang, and J. Yan (2013), Mona:
Secure Multi-Owner Data Sharing for Dynamic Groups in the
ISBN NO : 978 - 1502893314