6 research outputs found

    A secure cloud storage scheme on fog computing- βˆ’, βˆ’ and operation

    Get PDF
    Fog server based three-layer design has been introduced for secure storage employing multiple clouds. The fundamental methods utilized are Hash-Solomon code and redid hash algorithm so as to achieve the objective. However, it brought about loss of littler part of data to cloud servers and neglected to give better change location and data recoverability. It proposes a novel haze driven secure cloud storage plan to ensure data against unapproved access, alteration, and obliteration. To forestall ill-conceived get to, the proposed plot utilizes another system βˆ’ to cover data. Also, block management outsources the results of βˆ’ to forestall pernicious recovery and to guarantee better recoverability if there should arise an occurrence of data misfortune. At the same time, we propose a procedure dependent on hash algorithm so as to encourage alteration detection with higher probability

    A Multi-Authority Cipher Text Attribute-Based Encryption (CP-ABE) for G2C

    Get PDF
    We propose an adaptable, secure, cost savvy, and protection preserved cloud-based system for the healthcare condition. We propose a safe and proficient structure for the administration EHR framework, in which fine-grained get to control can be managed dependent on multi-authority ciphertext attribute based encryption (CP-ABE), together with a progressive structure, to uphold get to control strategies. The proposed system will permit chiefs in the Kingdom of Saudi Arabia to build up the social insurance segment and to profit by the current e-government cloud computing stage Yasser, which is liable for conveying shared services through a profoundly proficient, dependable, and safe condition. This system means to give health services and offices from the government to citizens (G2C)

    Mobile cloud computing system using Lightweight Secure Data Sharing Scheme

    Get PDF
    We propose a lightweight data sharing scheme (LDSS) for mobilecloud computing. It receives CP-ABE, an entrance control innovation utilized in typical cloud condition, yet changes the structure of access control tree to make it appropriate for mobile cloud situations. LDSS moves a substantial bit of the computational serious access control tree change in CP-ABE from cell phones to outer intermediary servers. Moreover, to lessen the client revocation cost, it introduces attribute description fields to implement lazy-revocation, which is a thorny issue in program based CP-ABE systems

    Secure File Sharing With Access Grants In Cloud

    Get PDF
    We first formally characterize an idea of shared ownership inside a document get to control demonstrate. We at that point propose two conceivable instantiations of our proposed shared ownership model. Our first arrangement, called Commune, depends on secure document dispersal and intrigue safe secret sharing to guarantee that all access gives in the cloud require the help of a concurred limit of owners. In that capacity, Commune can be utilized in existing mists without changes to the stages. Our second arrangement, named Comrade, influences the blockchain innovation so as to achieve accord on access control choice. In contrast to Commune, Comrade necessitates that the cloud can interpret get to control choices that achieve accord in the blockchain into capacity get to control rules, in this manner requiring minor changes to existing mists. We break down the security of our recommendations and think compare/evaluate their execution through usage using Amazon S3

    Efficient searchble technique to retrive ranked documents in cloud

    Get PDF
    A secure searchable encryption system is presented to allow searching of encrypted user data in the cloud. The system concurrently supports fuzzy keyword searching and matched results ranking, which are two important factors in facilitating practical searchable encryption. A chaotic fuzzy conversion technique is proposed to support secure fuzzy keyword indexing, storage and query. A secure posting list is also created to rank the matched results while maintaining the privacy and confidentiality of the user data, and saving the resources of the user mobile device

    Efficient cloud storage security scheme and data sharing in cloud

    Get PDF
    We propose the Secure Data Sharing in Clouds (SeDaSC) approach that gives: 1) information privacy and integrity; 2) get to control; 3) information sharing (sending) without utilizing register concentrated reencryption; 4) insider threat security; and 5) forward and in reverse access control. The SeDaSC strategy encodes a file with a solitary encryption key. Two distinctive key offers for every one of the clients are created, with the client just getting one offer. The ownership of a solitary offer of a key enables the SeDaSC system to counter the insider dangers. The other key offer is put away by a confided in outsider, which is known as the cryptographic server. The SeDaSC strategy is appropriate to traditional and portable cloud computing situations
    corecore