2017
DOI: 10.1109/jsyst.2014.2379646
|View full text |Cite
|
Sign up to set email alerts
|

SeDaSC: Secure Data Sharing in Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 174 publications
(112 citation statements)
references
References 9 publications
0
112
0
Order By: Relevance
“…The decryption process during the update of file access paths requires intensive computation. Ali et al (2017) and Levitin et al (2017) proposed a secure data transfer process in the cloud model. In particular, the authors considered the prevention of the invasion to be malicious insiders.…”
Section: Literature Surveymentioning
confidence: 99%
“…The decryption process during the update of file access paths requires intensive computation. Ali et al (2017) and Levitin et al (2017) proposed a secure data transfer process in the cloud model. In particular, the authors considered the prevention of the invasion to be malicious insiders.…”
Section: Literature Surveymentioning
confidence: 99%
“…A secure data sharing in clouds, SeDaScmechanismthat provides data confidentiality and integrity.Inthisscheme [2] encrypts a file with a single encryption key. In Ensuring data storage security in Cloud Computing [11], that introduces the new security threats in the cloud andsome techniques that provides data security in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Cloud computing [1] is an on demand internet based computing that provides shared computer processing data [2] and resources to other devices or computers. Cloud computing estimates the need of administrators to manage computing resources.…”
Section: Introductionmentioning
confidence: 99%
“…This characteristic of RSA is typically used by us to encrypt the data encryption key in our approaches and make more efficiency in the DR than that of [9,10] because their approaches need much more encryption and decryption operations in order to protect the confidentiality of the policy. For evaluation of the proposed system (SDS) performance we have compared the system with the recent approaches proposed in [20,21,22]. In [20], SeDaSC methodology encrypts a file with a single encryption key.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…For evaluation of the proposed system (SDS) performance we have compared the system with the recent approaches proposed in [20,21,22]. In [20], SeDaSC methodology encrypts a file with a single encryption key. SeDaSC generates two keys and one key is given to user and another key is stored in cryptographic server.…”
Section: Implementation and Evaluationmentioning
confidence: 99%