Abstract
In Data transmissions Expertise, Data sharing in cloud storage is getting considerable responsiveness, as it could offer consumers using well-organized as well as operational storing facilities. The cryptographic methods are generally practiced for protecting the privacy of the collective complex information. On the other hand for information distribution, the information safety remains quiet posturing important encounters in cloud storage. How to defend as well as withdraw the cryptographic basic remains the essential trial amongst them. We recommend a novel information safety device for cloud storage for tackling this that embraces the resulting properties. 1) Using twofold aspects, the cryptographic basic remains safeguarded. The privacy of the cryptographic basic remains detained, on condition that one of the dual features works. 2) In incorporating the substitution re-encoding as well as basic departure methods, the cryptographic basic could remain withdrawn proficiently. 3) Through implementing the characteristic grounded encoding method, the information is endangered in a finegrained approach. Moreover, the safety inquiry as well as presentation assessment demonstrate that our suggestion remains safe as well as well-organized, correspondingly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dropbox. www.dropbox.com
Google drive. https://www.google.com/drive/
Pcloud. www.pcloud.com/
Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232
Zhu Y, Ahn G-J, Hu H, Yau SS, An HG, Hu C-J (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238
Chen HC, Hu Y, Lee PP, Tang Y (2014) NCCloud: a network coding-based storage system in a cloud-of-clouds. IEEE Trans Comput 63(1):31–44
Encryption key virus threat. http://searchsecurity.techtarget.com/tip/Encryption-key-virusthreat
Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: Advances in cryptology–EUROCRYPT 2002. Springer, pp 65–82
Dodis Y, Katz J, Xu S, Yung M (2002) Strong key-insulated signature schemes. In: Public key cryptography–PKC 2003. Springer, pp 130–144
Hanaoka G, Hanaoka Y, Imai H (2006) Parallel key-insulated public key encryption. In: Public key cryptography-PKC 2006. Springer, pp 105–122
Libert B, Quisquater J-J, Yung M (2007) Parallel key-insulated public key encryption without random oracles. In: Public key cryptography–PKC 2007. Springer, pp 298–314
Liu J, Liang K, Susilo W, Liu J, **ang Y (2016) Two-factor data security protection mechanism for cloud storage system. IEEE Trans Comput 65(6):1992–2004
Winkler VJ. Cloud computing: Privacy, confidentiality and the cloud. https://technet.microsoft.com/en-us/magazine/dn235775.aspx
Liu JK, Wong DS (2008) Solutions to key exposure problem in ring signature. IJ Netw Secur 6(2):170–180
Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology– EUROCRYPT 2005. Springer, pp 457–473
Pirretti M, Traynor P, McDaniel P, Waters B (2006) Secure attribute based systems. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 99–112
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89–98
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Uma Vishweshwar, D., BalaRam, A., Kishore Babu, T. (2021). Secure Data Sharing Using Two Fold Cryptography Key Protection, Proxy Re-encryption and Key Separation Techniques. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_29
Download citation
DOI: https://doi.org/10.1007/978-981-15-7961-5_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7960-8
Online ISBN: 978-981-15-7961-5
eBook Packages: EngineeringEngineering (R0)