Skip to main content
Article thumbnail
Location of Repository

A Novel and Secure Data Sharing Model with Full Owner Control in the Cloud Environment

By Mohamed Meky and Amjad Ali

Abstract

Cloud computing is a rapidly growing segment of the IT industry that will bring new service opportunities with significant cost reduction in IT capital expenditures and operating costs, on-demand capacity, and pay-per-use pricing models for IT service providers. Among these services are Software-as-a-Service, Platform-as-a-Service, Infrastructure-as–a-Service, Communication-as-a-Service, Monitoring-as-a-Service, and Storage-as-a-Service. Storage-as-a-Service provides data owners a cost effective service to store massive data and handles efficient routine data backup by utilizing the vast storage capacity offered by a cloud computing infrastructure. However, shifting data storage to cloud computing infrastructure introduces several security threats to data as cloud providers may have complete control on the computing infrastructure that underpins the services. These security threats include unauthorized data access, compromise data integrity and confidentiality, and less direct control over data for data owner. The current literatures propose several approaches for storing and sharing data in the cloud environments. However, these approaches are either applicable to specific data formats or encryption techniques. In this paper, unlike previous studies, we introduce a secure and efficient model that allows the data owners to have full control over data sharing in the cloud environment. In addition, it prevents cloud providers from revealing data to unauthorized users. The proposed model can be used in different IT areas, with different data and encryption techniques, to provide secure data sharing for fixed and mobile computing devices

Topics: cloud computing, cloud storage, data sharing model, data access control, data owner full control, cloud storage as a service, data encryption, LCC:Electronic computers. Computer science, LCC:QA75.5-76.95, LCC:Instruments and machines, LCC:QA71-90, LCC:Mathematics, LCC:QA1-939, LCC:Science, LCC:Q, DOAJ:Computer Science, DOAJ:Technology and Engineering
Publisher: LJS Publisher and IJCSIS Press
Year: 2011
OAI identifier: oai:doaj.org/article:5a9c61247006465b9786aa7a5ce35f1c
Journal:
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://doaj.org/search?source=... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.