Effective Outsourcing Multiparty Computation Supporting Heterogeneous Keys
Main Article Content
Abstract
These days, numerous associations outsource information storing to the cloud such that a part of an association (data owner) can share information or data easily among other members (clients). Because of the presence of security concerns in the cloud, both managers and clients are recommended to check the integrity of cloud information with Provable Information Ownership (PIO) before further use of information. Nonetheless, past strategy outsourcing the information and application to a gathering part causes the security and protection issues to turn into a discriminating concern. In that framework security and protection properties are not completely dissected.. We have recognized five most illustrative security and protection qualities (i.e. confidentiality, integrity, availability, accountability, and privacy-preservability). Starting with these characteristics, we exhibit the connections among them, the vulnerabilities that may be misused by aggressors, the hazard models, and in addition existing protection techniques in a cloud situation. Security investigations demonstrate that our scheme is secure
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
X. Liu, Y. Zhang, B. Wang and J. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Group in the Cloud,” IEEE Tran. On Parallel and Distributed System,vol. 24, no. 6 June 2013.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H Katz,A. Konwinski, G. Lee, A.D. Patterson, A. Rabkin, I Stoica, and M. Zaharia, “ A View of Cloud Computing,” comm.ACM, vol. 53, no. 4, pp. 50-58, April 2010
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010
S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010
A.M. Lonea, D.E. Popescu, H. Tianfield ”Detecting DDoS Attacks in Cloud Computing Environment” INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February, 2013.
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003
D. Chaum and E. van Heyst, “Group Signatures,” Proc Int’l Conf.Theory and Applications of Cryptographic Technique (EUROCRYPT),p p. 257-265, 1991.
A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993
D. Naor, M. Naor, and J.B. Lotspiech, “Revocation and Tracing schemes for Stateless Receivers,” Proc. Ann. Int’l Cryptology
B. Wang, B. Li, and H. Li, “Knox: PrivacyPreserving Auditing for Shared Data with Large Groups in the Cloud Proc. 10th Int. Conf. Applied Cryptography and Network
B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” proc. Int’l Conf. Pratice and Theory in Public.