2018
DOI: 10.1155/2018/5634561
|View full text |Cite
|
Sign up to set email alerts
|

Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

Abstract: Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in "Paid Data Sharing" model, some valuable data should be encrypted before outsourcing for protecting owner's economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…We implemented a prototype of the model and analyzed the results with Ubuntu 16.04 1 on Oracle VM Virtual-Box 5.1.20 2 . Python 3 2.7.3 has been used for the implementation of the encryption algorithms.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We implemented a prototype of the model and analyzed the results with Ubuntu 16.04 1 on Oracle VM Virtual-Box 5.1.20 2 . Python 3 2.7.3 has been used for the implementation of the encryption algorithms.…”
Section: Methodsmentioning
confidence: 99%
“…Besides these, factors like authentication, authorization, audit are also important (see Fig. 1) [1][2][3].…”
Section: Cryptographic Primermentioning
confidence: 99%
“…An erasure correcting code has been employed in order to support reliable data storage to withstand multiple failures among CSPs. 26,27 A performance evaluation of the proposed large universe ciphertext and attribute-based encryption outsourcing scheme encompassing two hardware platforms such as Intel and ARM was undertaken and the employment of a key encapsulation variant was deliberated upon. 28 The safety investigation and performance assessment proved the planned method to be safe and proficient.…”
Section: Related Workmentioning
confidence: 99%
“…For the proposed multicloud environment, verification, and authentication of data exchange is done using a cryptographic protocol. An erasure correcting code has been employed in order to support reliable data storage to withstand multiple failures among CSPs 26,27 …”
Section: Introductionmentioning
confidence: 99%
“…have been proposed. However, on the other hand, whether in the stage of data collection or application, people can access the required multimedia resources more easily than before, which will pose a serious threat to the privacy and copyright protection of those multimedia resources [9]. Privacy protection and authentication technologies can be divided into two categories.…”
Section: Introductionmentioning
confidence: 99%