2022
DOI: 10.32604/csse.2022.019622
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

Abstract: Cloud storage is an incipient technology in today's world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The lower PLC accesses through Modbus TCP protocol to obtain the sensor data of each control point. Modbus TCP protocol communication adopts C/S mode structure, the local server is the client, and the lower controller PLC is the server [4]. The monitoring data of hydropower station are typical data.…”
Section: Hydropower Station Operation and Maintenance Monitoring Data...mentioning
confidence: 99%
“…The lower PLC accesses through Modbus TCP protocol to obtain the sensor data of each control point. Modbus TCP protocol communication adopts C/S mode structure, the local server is the client, and the lower controller PLC is the server [4]. The monitoring data of hydropower station are typical data.…”
Section: Hydropower Station Operation and Maintenance Monitoring Data...mentioning
confidence: 99%
“…Data users use symmetric keys to encrypt attribute queries. The management protocol manages the private key periodically, including generation, publishing and storage [13]. This management mode can ensure the forward and backward nature of attributes, and the hosting form of immediate revocation is more conducive to private key hosting.…”
Section: Cloud Computing Data Security Sharing Analysismentioning
confidence: 99%
“…The research community has done a lot of work to protect sensitive data security and privacy. In terms of addressing data usage conditions, there are data anonymization [1][2][3] and various data access control methods which include access control in internet of things [4,5], access control in cloud environments [6][7][8]. To solve the purpose of data usage, many privacy-protection system architectures can be found between decentralized data privacy with blockchain [9][10][11], data use policy [12], privacy property [13], and data usage control [14].…”
Section: Introductionmentioning
confidence: 99%