Effective Outsourcing Multiparty Computation Supporting Heterogeneous Keys

Main Article Content



These days, numerous associations outsource information storing to the cloud such that a part of an association (data owner) can share information or data easily among other members (clients). Because of the presence of security concerns in the cloud, both managers and clients are recommended to check the integrity of cloud information with Provable Information Ownership (PIO) before further use of information. Nonetheless, past strategy outsourcing the information and application to a gathering part causes the security and protection issues to turn into a discriminating concern. In that framework security and protection properties are not completely dissected.. We have recognized five most illustrative security and protection qualities (i.e. confidentiality, integrity, availability, accountability, and privacy-preservability). Starting with these characteristics, we exhibit the connections among them, the vulnerabilities that may be misused by aggressors, the hazard models, and in addition existing protection techniques in a cloud situation. Security investigations demonstrate that our scheme is secure

Article Details

How to Cite
VAKITI PULLAMRAJU, M. SRI LAKSHMI, and Dr.S.PREM KUMAR, “Effective Outsourcing Multiparty Computation Supporting Heterogeneous Keys”, Int. J. Comput. Eng. Res. Trends, vol. 2, no. 1, pp. 1–7, Jan. 2015.
Research Articles


X. Liu, Y. Zhang, B. Wang and J. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Group in the Cloud,” IEEE Tran. On Parallel and Distributed System,vol. 24, no. 6 June 2013.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H Katz,A. Konwinski, G. Lee, A.D. Patterson, A. Rabkin, I Stoica, and M. Zaharia, “ A View of Cloud Computing,” comm.ACM, vol. 53, no. 4, pp. 50-58, April 2010

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010

A.M. Lonea, D.E. Popescu, H. Tianfield ”Detecting DDoS Attacks in Cloud Computing Environment” INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February, 2013.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003

D. Chaum and E. van Heyst, “Group Signatures,” Proc Int’l Conf.Theory and Applications of Cryptographic Technique (EUROCRYPT),p p. 257-265, 1991.

A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993

D. Naor, M. Naor, and J.B. Lotspiech, “Revocation and Tracing schemes for Stateless Receivers,” Proc. Ann. Int’l Cryptology

B. Wang, B. Li, and H. Li, “Knox: PrivacyPreserving Auditing for Shared Data with Large Groups in the Cloud Proc. 10th Int. Conf. Applied Cryptography and Network

B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” proc. Int’l Conf. Pratice and Theory in Public.

Most read articles by the same author(s)

1 2 > >>