2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies 2014
DOI: 10.1109/icaccct.2014.7019398
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and secure data sharing for dynamic groups in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…As a hot topic for conflict resolution in crowdsourcing, the privacy issue in truth discovery has attracted significant attention, and various approaches based on cryptography [44][45][46][47][48][49] or differential privacy have been investigated. Miao et al [16] proposed the first privacypreserving approach called PPTD, which relies on the threshold homomorphic cryptosystem [50] to protect the confidentiality of the worker's answers and weights.…”
Section: Related Workmentioning
confidence: 99%
“…As a hot topic for conflict resolution in crowdsourcing, the privacy issue in truth discovery has attracted significant attention, and various approaches based on cryptography [44][45][46][47][48][49] or differential privacy have been investigated. Miao et al [16] proposed the first privacypreserving approach called PPTD, which relies on the threshold homomorphic cryptosystem [50] to protect the confidentiality of the worker's answers and weights.…”
Section: Related Workmentioning
confidence: 99%
“…Hao has applied this method to group signatures, along with a secure group secret key distribution protocol [6]. Sun et al developed a distributed key management(DKM) system in which a protocol group administrator of the region updates the secret key of the group [7]. Existing proposals include authentication methods and conditional privacy features; however, conventional group signature schemes are unsuitable for use in the VANET environment.…”
Section: Node Moving Pattern (Speed and Direction)mentioning
confidence: 99%
“…Regardless supporting Dynamic Operations or File Sharing, these works supported third party verifier, which could be a real security risk for data Integrity in the cloud. Few of researchers deal with integrity problem taking in consideration data sharing, Marimuthu et al (Marimuthu,K. et al, 2014) proposed a secure multiowner data sharing scheme, for dynamic group in the cloud and they integrated Image based authentication with it to achieve high level of security in authenticating the use.…”
Section: Related Workmentioning
confidence: 99%
“…But when a user want to access data, he/she should sends a download request to the third part (that is responsible for key management, encryption, decryption, and access control) which could be one of threats on data. So, Marimuthu et al (Marimuthu,K. et al, 2014) and Aarthi and Indira (Aarthi, 2016) used different types of hashing and encryption and supported File Sharing but didn't support dynamic operations on these files.…”
Section: Related Workmentioning
confidence: 99%