Secure sharing of data in cloud computing

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is emerging as an increasingly popular computing paradigm. Sharing of data in the cloud environments raises the issues of confidentiality, integrity, and availability. In this paper, we propose a framework and methodology for sharing data over untrusted cloud, using proxy re-encryption based on elliptic curve discrete logarithm problem. The proposed methodology imperatively imposes the access control policies of data originator, preventing the cloud storage providers from unauthorized access and illegal authorization to access the data.

Cite

CITATION STYLE

APA

Tiwari, D., & Gangadharan, G. R. (2015). Secure sharing of data in cloud computing. In Communications in Computer and Information Science (Vol. 536, pp. 24–35). Springer Verlag. https://doi.org/10.1007/978-3-319-22915-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free