2016
DOI: 10.1002/sec.1770
|View full text |Cite
|
Sign up to set email alerts
|

A robust cryptographic‐based system for secure data sharing in cloud environments

Abstract: Over the past few years, the usage of cloud storage services has been growing rapidly to share digital objects between data owner and consumers. However, such environment introduces many data privacy disclosure challenges. These challenges are maintaining data confidentiality, enforcing fine‐grained data access control, applying efficient user revocation mechanism, and resisting collusion between system users. In addition, such environment imposes the support of system scalability and generic implementation fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Ibrahim et al have proposed a powerful system based on cryptographic to use for securing the process of data shared in the cloud environment to overcome all the challenges in honest-but-curious cloud environments. The challenges include preserving the confident data, enforcing fine-grained data access control, the application of sufficient approach of user revocation, and forbidding collusion amongst the users of the system [26]. However, getting PKI public/private keys with the related right digital certificate is treated outside the scope of the presented research.…”
Section: B Certificate Authoritymentioning
confidence: 99%
“…Ibrahim et al have proposed a powerful system based on cryptographic to use for securing the process of data shared in the cloud environment to overcome all the challenges in honest-but-curious cloud environments. The challenges include preserving the confident data, enforcing fine-grained data access control, the application of sufficient approach of user revocation, and forbidding collusion amongst the users of the system [26]. However, getting PKI public/private keys with the related right digital certificate is treated outside the scope of the presented research.…”
Section: B Certificate Authoritymentioning
confidence: 99%
“…Some examples of hash algorithms are MD5 and SHA. Cloud computing Infrastructure as a Service (IAAS) presents an important service to users through the internet which called cloud storage [3][4][5][6]. There are many advantages to this service such as possible remote data access at any time and on-demand resource deployment.…”
Section: Introductionmentioning
confidence: 99%