The Secured Cloud Storage with Efficient Key Generation in cloud computing

K Surya Kranthi, Kakarla Ravi kumar

Abstract


Many cloud storage encryption schemes have been acquainted with shield data from the individuals who don't approach. We make utilization of numerous schemes which expected that cloud storage suppliers are protected and secure. In any case, by and by, a few specialists (i.e., coercers) may endeavor to uncover data from the cloud without the authorization of the data proprietor. In this paper, we present that the discovery of namelessness clients with the utilization of our productive deniable encryption conspire, while the phony clients endeavors to get data from the cloud they will be given some phony files. With the goal that programmers can't hack the files from the cloud. Also, they are happy with their copy document by that way we can secure the proprietor mystery files or confidential files. Anyway by and by, a few specialists may propel cloud storage suppliers to make open client insider facts and confidential data. In this paper, we present our plan for another cloud storage encryption plot that empowers cloud storage suppliers to make persuading counterfeit client insider facts to secure client protection. Since coercers can't confess whenever acquired privileged insights are valid or not, the cloud storage supplier guarantee that client security is still safely ensured.


References


Chi PW, Lei CL. Audit-Free Cloud Storage via Deniable Attribute-based Encryption. IEEE Transactions on Cloud Computing. 2015 Apr 21.

Aparna, P. and Murthy, K.S.N., 2016. A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service. IJSEAT, 4(10), pp.602-604.

Greenwald, G. and MacAskill, E., Boundless Informant: the NSA’s secret tool to track global surveillance data. The Guardian, 11. 2013.

Edward snowden. [Online]. Available:http://en.wikipedia.org/wiki/Edwar d Snowden (2014)

Canetti, R., Dwork, C., Naor, M. and Ostrovsky, R., 1997, August. Deniable encryption. In Annual International Cryptology Conference (pp. 90-104). Springer Berlin Heidelberg.

Chi, Po-Wen, and Chin-Laung Lei. "AuditFree Cloud Storage via Deniable Attributebased Encryption." IEEE Transactions on Cloud Computing (2015).

Sahai, A., Seyalioglu, H. and Waters, B., 2012. Dynamic credentials and ciphertext delegation for attribute-based encryption. In Advances in Cryptology–CRYPTO 2012 (pp. 199-217). Springer Berlin Heidelberg.

Dr. T Ramaprahu, S priya. An Auditing-free Cloud Storage Using Control Attribute Based Encryption, in © IJIRCCE 2016, DOI: 10,15680/IJIRCCE.2016.0407141.

Cheng-Chi Lee, Pei-Shan Chung and MinShiang Hwang, A Survey on Attribute Based Encryption Scheme of Access Control in Cloud Environment, in international journal of Network Security, 2013, pp. 231-240.

P. Lokesh Kumar Reddy, B. Rama Bhupal Reddy, S. Rama Krishna, Deniable Encryption key, IOSR-JCE, 2013, pp. 08-12.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â