An efficient crime group of secured data sharing scheme in cloud
The importance of cloud computing is the users can accomplish an effective and economical approach for data sharing among group members in the cloud with the characteristics of low maintenance and little management cost. Cloud security is a part of computer security. Data confidentiality requires th...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/69038/1/FSKTM%202018%2057%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.69038 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.690382019-06-17T01:38:55Z An efficient crime group of secured data sharing scheme in cloud 2018 Rashid, Mustafa Noori The importance of cloud computing is the users can accomplish an effective and economical approach for data sharing among group members in the cloud with the characteristics of low maintenance and little management cost. Cloud security is a part of computer security. Data confidentiality requires that unauthorized users including the cloud are incapable of learning the content of the stored data. Maintenance of the availability of data confidentiality for dynamic groups is still an important and challenging issue. The cloud provider cannot be treated as a trusted third party (cloud storage services) because of its semi-trust nature, and thus the traditional security models cannot be straight forwardly generalized into cloud based group sharing frameworks. We propose a crime group of information sharing framework for cloud, which can effectively take advantage of the cloud servers' help but have no sensitive data being exposed to attackers and the cloud provider. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. By adopting proxy re-encryption, most computationally intensive operations can be delegated to cloud servers without disclosing any private information. Extensive security and performance analysis shows that our proposed scheme is of high efficiency and satisfies the security requirements for public cloud-based secure groups. Cloud Computing Cloud computing - Security measures 2018 Thesis http://psasir.upm.edu.my/id/eprint/69038/ http://psasir.upm.edu.my/id/eprint/69038/1/FSKTM%202018%2057%20IR.pdf text en public masters Universiti Putra Malaysia Cloud Computing Cloud computing - Security measures |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Cloud Computing Cloud computing - Security measures |
spellingShingle |
Cloud Computing Cloud computing - Security measures Rashid, Mustafa Noori An efficient crime group of secured data sharing scheme in cloud |
description |
The importance of cloud computing is the users can accomplish an effective and economical approach for data sharing among group members in the cloud with the characteristics of low maintenance and little management cost. Cloud security is a part of computer security. Data confidentiality requires that unauthorized users including the cloud are incapable of learning the content of the stored data. Maintenance of the availability of data confidentiality for dynamic groups is still an important and challenging issue. The cloud provider cannot be treated as a trusted third party (cloud storage services) because of its semi-trust nature, and thus the traditional security models cannot be straight forwardly generalized into cloud based group sharing frameworks. We propose a crime group of information sharing framework for cloud, which can effectively take advantage of the cloud servers' help but have no sensitive data being exposed to attackers and the cloud provider. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. By adopting proxy re-encryption, most computationally intensive operations can be delegated to cloud servers without disclosing any private information. Extensive security and performance analysis shows that our proposed scheme is of high efficiency and satisfies the security requirements for public cloud-based secure groups. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Rashid, Mustafa Noori |
author_facet |
Rashid, Mustafa Noori |
author_sort |
Rashid, Mustafa Noori |
title |
An efficient crime group of secured data sharing scheme in cloud |
title_short |
An efficient crime group of secured data sharing scheme in cloud |
title_full |
An efficient crime group of secured data sharing scheme in cloud |
title_fullStr |
An efficient crime group of secured data sharing scheme in cloud |
title_full_unstemmed |
An efficient crime group of secured data sharing scheme in cloud |
title_sort |
efficient crime group of secured data sharing scheme in cloud |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2018 |
url |
http://psasir.upm.edu.my/id/eprint/69038/1/FSKTM%202018%2057%20IR.pdf |
_version_ |
1747812660170194944 |