Secure Data Sharing in Cloud Computing: A Comprehensive Review

Authors

  • Muthi Reddy P Department of Computer Science and Engineering, University of Visvesvaraya College of Engineering, Bangalore University, Bengaluru-560001, India
  • Manjula S. H. Department of Computer Science and Engineering, University of Visvesvaraya College of Engineering, Bangalore University, Bengaluru-560001, India
  • Venugopal K. R. Department of Computer Science and Engineering, University of Visvesvaraya College of Engineering, Bangalore University, Bengaluru-560001, India

Keywords:

Encryption, Key-Aggregate, Backward Secrecy, Forward secrecy, Regenerative coding.

Abstract

Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental dif?culties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher bene?ts. The most effective method to share information resources among the individuals from the group in distributed storage is secure, ?exible and ef?cient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Ef?cient Virtual Machines Scheduling in Multi-Tenant Data Centers.

References

Guillermo Indalecio, Fernando Gomez-Folgar, and Antonio J. GarciaLoureiro, “GWMEP: Task Manager-as-a-Service in Apache Cloud Stack”, IEEE Internet Computing, vol. 20, no. 2, pp. 42-49, March/April 2016.

Lo, ai Tawalbeh, Nour S. Darwazeh, Raad S. Al-Qassas and Fahd AlDosari, “A Secure Cloud Computing Model Based on Data Classification”, Elsevier Procedia Computer Science, vol. 52, pp. 1153-1158, 2015.

Jean Bacon, David Eyers, Thomas F. J. M. Pasquier, Jatinder Singh, Ioannis Papagiannis and Peter Pietzuch, “Information Flow Control for Secure Cloud Computing”, IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 76-89, March 2014.

Joseph K. Liu, Man Ho Au,Willy Susilo, Kaitai Liang, Rongxing Lu and Bala Srinivasan, “Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud”, IEEE Journal on Network, vol. 29, no. 2, pp. 46-50, 2015.

Ming Li, Shucheng Yu, Yao Zheng, Kui Renand Wenjing Lou, ”Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, January 2013.

LI Chaoling, CHEN Yue and ZHOU Yanzhou, “ADataAssuredDeletion Scheme in Cloud Storage”, IEEE China Communications, vol. 11, no. 4, pp. 98-110, April 2014.

Mauro Gaggero and Luca Caviglione, “Predictive Control for EnergyAware Consolidation in Cloud Datacenters”, IEEE Transactions on Control Systems Technology, vol. 24, no. 2, pp. 461-474, 2016.

Mahyar Movahed Nejad, Lena Mashayekhy and Daniel Grosu, “Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds”, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 594-603, 2015.

Atta Ur Rehman Khan, Mazliza Othman and Sajjad Ahmad Madani, “Mobile Cloud Computing Application Models”, IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 393-413, 2014.

Ki-Woong Park, Jaesun Han, JaeWoong Chung and Kyu Ho Park, “THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment”, IEEE Transactions on Services Computing, vol. 6, no. 3, pp. 300-313, July-September 2013.

Sheng Di and Cho-Li Wang, “Error-Tolerant Resource Allocation and Payment Minimization for Cloud System”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1097-1106, June 2013.

Elli Kartsakli, Angelos Antonopoulos, Aris S. Lalos, Stefano Tennina, Marco Di Renzo, Luis Alonso and Christos Verikoukis, “Reliable MAC Design for Ambient Assisted Living: Moving the Coordination to the Cloud”, IEEE Communications Magazine, vol. 53, no. 1, pp. 78-86, 2015.

Jun Zhou, Xiaodong Lin, Xiaolei Dong and Zhenfu Cao, “PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System”, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 6, pp. 1693-1703, June 2015.

Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey and Jinjun Chen, “A Privacy Leakage Upper Bound Constraint-Based Approach for CostEffective Privacy Preserving of Intermediate Data Sets in Cloud”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1192-1202, June 2013.

Joseph K. Liu, Man Ho Au and Xinyi Huang, “Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 484-497, March 2016.

Haroon Raja and Waheed U. Bajwa, “Cloud K-SVD: A Collaborative Dictionary Learning Algorithm for Big, Distributed Data”, IEEE Transactions on Signal Processing, vol. 64, no. 1, pp. 173-188, 2016.

Xuyun Zhang, Wanchun Dou and Jian Pei, “Proximity-Aware LocalRecoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud”, IEEE Transactions on Computers, vol. 64, no. 8, pp. 2293-2307, August 2015.

Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu and Willy Susilo, “Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 1717-1726, March 2016.

TAN Shuang, TAN Lin, LI Xiaoling and JIA Yan, “An Efficient Method for Checking the Integrity of Data in the Cloud”, IEEE China Communications, vol. 11, no. 9, pp. 68-81, 2014.

Yongdae Kim, Adrian Perrig and Gene Tsudik, “Group Key Agreement Efficient in Communication”, IEEE Transactions on Computers, vol. 53, no. 7, pp. 905-921, July 2004.

Lazaros Gkatzikis and Iordanis Koutsopoulos, “Migrate or Not Exploiting Dynamic Task Migration in Mobile Cloud Computing Systems”, IEEE Wireless Communications, vol. 20, no. 3, pp. 24-32, 2013.

S H Manjula, Bindu Reddy E, Shaila K, L Nalini, Venugopal K R and L M Patnaik, “Base-Station Controlled Clustering Scheme in Wireless Sensor Networks”, IFIP Wireless Days Conference, Dubai, e-ISBN: 978-1-4244-2829-8, p-ISBN: 978-1-4244-2828-1, pp. 1-5, November 24-27, 2008.

Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong and Qi Xi, “A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing”, IEEE Transactions on Information Forensics and Security, vol. 9, no. 10, pp. 1667-1680, October 2014.

Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou and Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 468-477, February 2014.

Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li and Xiaojun Zhang, “SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems against Malicious Auditors”, IEEE Transactions on Computational Social Systems, vol. 2, no. 4, pp. 159170, December 2015.

Xuefeng Liu, Yuqing Zhang, Boyang Wang and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1182-1191, June 2013.

Anita Kanavalli, P Deepa Shenoy, Venugopal K R, L M Patnaik, A Flat Routing Protocol in Sensor Networks, International Conference on Methods and Models in Computer Science, New Delhi, ISBN: 978-14244-5051-0, pp. 1-5, December 1416, 2009.

Kaitai Liang and Willy Susilo, “Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1981-1992, September 2015.

Kan Yang, Zhen Liu, Xiaohua Jia and Xuemin (Sherman) Shen, “TimeDomain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach”, IEEE A Cryptographic Approach, vol. 18, no. 5, pp. 940-950, 2016.

Junbeom Hur, “Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 11, pp. 2171-2180, November 2013.

S.S.M. Chow, Y. Dodis, Y. Rouselakis and B. Waters, “Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions”, Proceedings ACM Conference Computer and Comm. Security, pp. 152-161, 2010.

T.H. Yuen, S.S.M. Chow, Y. Zhang and S.M. Yiu, “Identity-Based Encryption Resilient to Continual Auxiliary Leakage”, Springer Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 112-134, 2012.

S Raghavendra, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar, and L M Patnaik, DRSMS: Domain and Range Specific MultiKeyword Search over Encrypted Cloud Data”, International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 5, pp. 69-78, May 2016.

Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 384-394, February 2014.

Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen and Weixin Xie, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing”, IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1265-1277, June 2016.

Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, “Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 3025-3035, November 2014.

Raghavendra, Girish S, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar and L M Patnaik, “IGSK: Index Generation on Split Keyword for Search over Cloud Data”, IEEE in Proceedings of CoCoNET 2015, Trivandrum, December 2015.

Kan Yang and Xiaohua Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717-1726, September 2013.

Olivier Beaumont, Lionel Eyraud-Dubois, Christopher Thraves Caro and Hejer Rejeb, “Heterogeneous Resource Allocation under Degree Constraints”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp. 2354-2363, May 2013.

Arshdeep Bahga and Vijay K. Madisetti, “Analyzing Massive Machine Maintenance Data in a Computing Cloud”, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1831-1843, October 2012.

Sharrukh Zaman and Daniel Grosu, “A Combinatorial Auction-Based Mechanism for Dynamic VM Provisioning and Allocation in Clouds”, IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 129-141, July-December 2013.

Kushang Parikh, Nagesh Hawanna, Haleema.P.K, Jayasubalakshmi.R and N.Ch.S.N.Iyengar, “Virtual Machine Allocation Policy in Cloud Computing Using CloudSim in Java”, International Journal of Grid Distribution Computing, vol. 8, no. 1, pp. 145-158, 12 2015.

Song Wu, Zhou, Huahua Sun, Hai Jin and Xuanhua Shi, “Poris: A Scheduler for Parallel Soft Real-Time Applications in Virtualized Environments”, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 3, pp. 841-854, 2016.

Xiaolin LI, V. Bharadwaj and C. C. KO, “Divisible Load Scheduling on Single-Level Tree Networks with Buffer Constraints”, IEEE Transactions on Aerospace and Electronic Systems, vol. 36, no. 4, pp. 1298-1308, October 2000.

Zeng Zeng and Bharadwaj Veeravalli “Design and Performance Evaluation of Queue-and-Rate-Adjustment Dynamic Load-Balancing Policies for Distributed Networks”, IEEE Transactions on Computers, vol. 55, no. 11, pp. 1410-1422, November 2006.

Juan Du, Daniel J. Dean, Yongmin Tan, Xiaohui Gu and Ting Yu, “Scalable Distributed Service Integrity Attestation for Software-as-aService Clouds”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 730-739, March 2014.

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu and Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”, IEEE Transactions on Computers, vol. 64, no. 4, pp. 971-983, April 2015.

P.Krithika, G.Linga Dilipan and M.Shobana, “Enhancing Cloud Computing Security for Data Sharing within Group Members”, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 17, no. 2, pp. 110-114, Ver. V, MarApr. 2015.

Aritra Dasgupta and Robert Kosara, “Adaptive Privacy-Preserving Visualization Using Parallel Coordinates”, IEEE Transactions on Visualization and Computer Graphics, vol. 17, no. 12, pp. 2241-2248, December 2011.

Chao-Yung Hsu, Chun-Shien Lu and Soo-Chang Pei, “Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT”, IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4593-4607, November 2012.

Boyang Wang, Baochun Li and Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE transactions on cloud computing, vol. 2, no. 1, pp. 43-56, January-March 2014.

B. Wang, S.S.M. Chow, M. Li and H. Li, “Storing Shared Data on the Cloud via Security-Mediator”, IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 124-133, 2013.

Jiawei Yuan and Shucheng Yu “Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1717-1726, August 2015.

Mi Wen, Kaoru Ota, He Li, Jingsheng Lei, Chunhua Gu and Zhou Su, “Secure Data Deduplication with Reliable Key Management for Dynamic Updates in CPSS”, IEEE Transactions on Computational Social Systems, vol. 2, no. 4, pp. 137-147, December 2015.

Hui Zhang, Guofei Jiang, Kenji Yoshihira and Haifeng Chen, “Proactive Workload Management in Hybrid Cloud Computing”, IEEE Transactions on Network and Service Management, vol. 11, no. 1, pp. 90-100, 2014.

LUO Yuchuan, FU Shaojing, XU Ming and WANG Dongsheng, “Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage”, IEEE Communications, vol. 11, no. 11, pp. 114-124, 2014.

Bharath K Shamanthula, Yousef Elmehdwi, Gerry Howser and Sanjay Madria, “A Secure Data Sharing and Query Processing Framework via Federation of Cloud Computing”, Elsevier Information System journal, vol. 48, pp. 196-212, 2015.

Jiaxin, Dongsheng Li, Yuming Ye and Xicheng Lu, “Efficient MultiTenant Virtual Machine Allocation in Cloud Data Centers”, Tsinghua Science and Technology, vol. 20, no. 1, pp. 81-89, 2015.

Jun Duan and Yuanyuan Yang, “Placement and Performance Analysis of Virtual Multicast Networks in Fat-Tree Data Center Networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 10, pp. 3013-3028, 2016.

YusenLi,XueyanTangandWentongCai, “PlayRequestDispatchingfor Efficient Virtual Machine Usage in Cloud Gaming”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 12, pp. 20522063, 2015.

S Raghavendra, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar and L M Patnaik, DRSIG: Domain and Range Specific Index Generation for Encrypted Cloud Data”, in Proceedings of International Conference on Computational Techniques in Information and Communication Technologies, ICCTICT 2016, March 11-13, 2016.

Swarupkshatriya and Dr.Sandip M Chaware, “A Survey on Data Sharing Using Encryption Technique in Cloud Computing”, International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 4, pp. 5351-5354, 2014.

Huang Ginlong, Ma Zhaofeng, Yang Yixian, Niuxinxin and Fujingyi, “Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing”, IEEE China Communications, vol. 11, no. 4, pp. 50-63, 2014.

Elham Abd Al Latif A Badawi and Ahmed Kayed, “Survey on Enhancing the Data Security of the Cloud Computing Environment by Using Data Segregation Technique”, Academic Research Publishing Agency:(arapapress) International Journal of Research and Reviews in Applied Sciences, vol. 23, no. 2, pp. 136, May 2015.

Baojiang Cui, Zheli Liu and Lingyu Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage”, IEEE Transactions on Computers, vol. 65, no. 8, pp. 2374-2385, August 2016.

Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba and Mariappan Rajaram, “Secure Logging As a Service-Delegating Log Management to the Cloud”, IEEE Systems Journal, vol. 7, no. 2, pp. 323-334, June 2013.

Rong Yu and Stein Gjessing, “Toward Cloud-Based Vehicular Networks with Efficient Resource Management”, IEEE Network Journal, vol. 27, no. 5, pp. 48-55, 2013.

Zhihua Xia, Xinhui Wang, Xingming Sun and Qian Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, February 2016.

Wei Zhang, Yaping Lin, Sheng Xiao, Jie Wu and Siwang Zhou, “Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing”, IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566-1577, May 2016.

S Raghavendra, C M Geeta, K Shaila, Rajkumar Buyya, K R Venugopal, S S Iyengar and L M Patnaik, “MSSS: Most Significant Singlekeyword Search over Encrypted Cloud Data”, International Conference on ICT: Big Data, Cloud and Security, Singapore, Global Science and Technology Forum (GSFT), ISSN: 2251-3043, pp. 43-48, July 27-28, 2015.

Rampal Singh, Sawan Kumar and Shani Kumar Agrahari, “Ensuring Data Storage Security in Cloud Computing”, IOSR Journal of Engineering, vol. 2, no. 12, pp. 17-21, December 2012.

N. Shang, M. Nabeel, F. Paci and E. Bertino, “Preserving Policy-Based Content Sharing in Public Clouds”, IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 11, pp. 2602-2614, 2013.

Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang and Hai Jin, “Conditional Identity Based Broadcast Proxy Re-encryption and its Application to Cloud Email”, IEEE Transactions on Computers, vol. 65, no. 1, pp. 66-79, January 2016.

R. L. Grossman, “The Case for Cloud Computing”, IEEE IT Professional, vol. 11, no. 2, pp. 23-27, Mar-April 2009.

Mohamed Nabeel, Ning Shang and Elisa Bertino, “Privacy Preserving Policy-Based Content Sharing in Public Clouds”, IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 11, pp. 2602-2614, November 2013.

http://searchsecurity.techtarget.com/definition/one-time-password-OTP.

Kyle Chard, Kris Bubendorfer, Simon Caton and Omer F. Rana, “Social Cloud Computing: A Vision for Socially Motivated Resource Sharing”, IEEE Transactions on Services Computing, vol. 5, no. 4, pp. 551-563, October-December 2012.

Surjimol R “A Social Compute Cloud: For Sharing Resources”, International Journal of Science and Research (IJSR), vol. 4, no. 2, February 2015.

Hong Liu, Huansheng Ning, Qingxu Xiong and Laurence T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 1, pp. 241-251, 2015.

Nektarios Georgios Tsoutsos and Michail Maniatakos, “The HEROIC Framework: Encrypted Computation without Shared Keys”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 6, pp. 875-888, June 2015.

S Raghavendra, Doddabasappa P A, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar, and L M Patnaik, “Secure Multi-Keyword Search and Multi-User Access Control Over an Encrypted Cloud Data”, International Journal of Information Processing (IJIP), vol. 10, no. 2, 2016.

Xiangming Dai, Jason Min Wang and Brahim Bensaou, “EnergyEfficient Virtual Machines Scheduling in Multi-Tenant Data Centers”, IEEE Transactions on Cloud Computing, vol. 4, no. 2, pp. 210-221, 2016.

Jingwei Li, Jin Li, Dongqing Xie and Zhang Cai, “Secure Auditing and Deduplicating Data in Cloud”, IEEE Transactions on Computers, vol. 65, no. 8, pp. 2386-2396, August 2016.

CHEN Danwei, CHEN Linling, FAN Xiaowei, HE Liwen, PAN Su and Hu Ruoxiang, “Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing”, IEEE Journal of China Communications, vol. 11, no. 13, pp. 121-127, 2014.

Jenn-Wei Lin, Chien-Hung Chen and J. Morris Chang, “QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems”, IEEE Transactions on Cloud Computing, vol. 1, no. 1, pp. 101-115, January-June 2013.

Xinhua Dong, Ruixuan Li, Heng He, Wanwan Zhou, Zhengyuan Xue and Hao Wu, “Secure Sensitive Data Sharing on a Big Data Platform”, IEEE Tsinghua Science and Technology, vol. 20, no. 1, pp 72-80, February 2015.

Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, February 2013.

S.S.M. Chow, Y.J. He, L.C.K. Hui and S.M. Yiu, “SPICE: Simple Privacy-Preserving Identity-Management for Cloud Environment”, Springer Applied Cryptography and Network Security (ACNS), vol. 7341, no. 4, pp. 526-543, 2015.

XinfengYe “PrivacyPreservingandDelegatedAccessControlforCloud Applications”, IEEE Tsinghua Science and Technology, vol. 21, no. 1, pp. 40-54, February 2016.

Junggab Son, Rasheed Hussain, Hunmin Kim and Heekuck Oh, “SCDVR: A Secure Cloud Computing Based Framework for DVR Service”, IEEE Transactions on Consumer Electronics, vol. 60, no. 3, pp. 368-374, August 2014.

Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li, “Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data”, IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239-250, July/August 2013.

Amr Alasaad, Kaveh Shafiee, Hatim M. Behairy and Victor C.M. Leung, “Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications”, IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1021-1033, April 2015.

Jinbo Xiong, Ximeng Liu and Zhiqiang Yao, “A Secure Data SelfDestructing Scheme in Cloud Computing”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 448-458, October-December 2014.

Jianfeng Ma, Qi Li, Kui Geng and Patrick S. Chen, “A Secure Data Self-Destructing Scheme in Cloud Computing”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 448-458, October-December 2014.

Sheng Di, Derrick Kondo and Cho-Li, “Optimization of Composite Cloud Service Processing with Virtual Machines”, IEEE Transactions on Computers, vol. 64, no. 6, pp. 1717-1726, June 2015.

Kyle Anderson, Jimmy Du, Amit Narayan and Abbas El Gamal, “GridSpice: A Distributed Simulation Platform for the Smart Grid”, IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 23542363, November 2014.

Oliver Sinnen and Leonel A. Sousa, “Communication Contention in Task Scheduling”, IEEE Transactions on, Parallel and Distributed Systems, vol. 16, no. 6, pp. 503-515, June 2005.

Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding and Elisa Bertino, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds”, IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2107-2119, September 2014.

Gangyong Jia, Guangjie Han and Daqiang Zhang, “An Adaptive Framework for Improving Quality of Service in Industrial Systems, IEEE Access, vol. 3, pp. 2129-2139, 2015.

Kaiping Xue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459-470, 2014.

Lan Zhou, Vijay Varadharajan and Michael Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1947-1960, December 2013.

Raghavendra, C M Geeta, Rajkumar Buyya, K R Venugopal, S S Iyengar and L M Patnaik, “MSIGT: Most Significant Index Generation Technique for Cloud Environment”, IEEE International Conference, INDICON 2015, New Delhi, December 17-20, 2015.

Zhonmga Zhu and Rui Jiang, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 40-50, January 2016.

S.S.M. Chow, J. Weng, Y. Yang and R.H. Deng, “Efficient Unidirectional Proxy Re-Encryption”, Springer International Conference on Cryptology in Africa, pp. 316-332, July 2010.

LI Shuanbao and FU Jianming, “User Revocation for Data Sharing Based on Broadcast CP-ABE in Cloud Computing”, IET Communications Security Conference (CSC 2014), 2014, pp. 1-8, 2014.

Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang and Jinjun Chen, “MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud”, IEEE Transactions on Computers, vol. 64, no. 9, pp. 26092622, September 2015.

Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan and Ramamohanarao Kotagiri, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2234-2244, September 2014.

Qiang Tang, “Nothing is for Free: Security in Searching Shared and Encrypted Data”, IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1943-1952, November 2014.

Taeho Jung, Xiang-Yang Li, Zhiguo Wan and Meng Wan, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190-199, January 2015.

Tanuja R, Shruthi Y R, Manjula S H, Venugopal K R and L M Patnaik, “Token based Privacy Preserving Access Control in Wireless Sensor Networks”, In Proceedings of IEEE 21st Annual International Conference on Advanced Computing and Communications ADCOM2015, IIT Chennai, pp. 45-50, 2015.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren and W. Lou “PrivacyPreserving Public Auditing for Secure Cloud Storage”, IEEE Transaction of Computers, vol. 62, no. 2, pp. 362-375, February 2013.

Qia Wang, Wenjun Zeng and Jun Tian, “A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework”, IEEE Transactions on Image Processing, vol. 23, no. 3, pp. 1317-1328, March 2014.

Rosa Snchez, Florina Almenares and Patricia Arias, “Enhancing Privacy and Dynamic Federation in IdM for Consumer Cloud Computing”, IEEE Transaction on Consumer Electronics, vol. 58, no. 1, pp. 98-103, 2012.

Henry C.H. Chen and Patrick P.C. Lee, “Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 407-416, February 2014.

Fei Xu, Fangming Liu, Linghui Liu, Hai Jin, Bo Li and Baochun Li, “iAware: Making Live Migration of Virtual Machines InterferenceAware in the Cloud” , IEEE Transactions on Computers, vol. 63, no. 12, pp. 3012-3025, December 2014.

Piotr K. Tysowski and M. Anwarul Hasan, “Hybrid Attribute and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds”, IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 172-186, July-December 2013.

Renjith P and Sabitha S, “Survey on Data Sharing and Re-Encryption in Cloud”, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), vol. 2, no. 2, pp. 465-477 February 2013.

Ashraf E. Al-Fagih, Fadi M. Al-Turjman, Waleed M. Alsalih and Hossam S. Hassanein, “A Priced Public Sensing Framework for Heterogeneous IoT Architectures”, IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 133-147, September 2013.

G. Ateniese, A.D. Santis, A.L. Ferrara and B. Masucci, ProvablySecure Time-Bound Hierarchical Key Assignment Schemes”, Journal of Cryptology, vol. 25, no. 2, pp. 243-270, 2012.

Heng He, Ruixuan Li, Xinhua Dong and Zhao Zhang, “Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud”, IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 471-484, October-December 2014.

Noman Mohammed, Dima Alhadidi, Benjamin C.M. Fung and Mourad Debbabi, “Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data”, IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 1, pp. 59-71, January/February 2014.

Ankatha Samuyelu Raja and Vasanthi A “Secured Multi-keyword Ranked Search over Encrypted Cloud Data ”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 10, October 2012.

Yogachandran Rahulamathavan, Raphael C.W. Phan, Suresh Veluru, Kanapathippillai Cumanan and Muttukrishnan Rajarajan, “Privacy Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud”, IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 5, pp. 467-479, September/October 2014.

Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P.C. Lee and Wenjing Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615-1625, June 2014.

Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan and Abdulhameed Alelaiwi, “Secure Distributed Deduplication Systems with Improved Reliability”, IEEE Transactions on Computers, vol. 64, no. 12, pp. 3569-3579, December 2015.

T. Okamoto and K. Takashima, “Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption”, Springer Designs, Codes and Cryptography, vol. 77, no. 2-3, pp. 725771, 2015.

Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li and Chun-Jen Chung, “Efficient Attribute-Based Comparable Data Access Control”, IEEE Transactions on Computers, vol. 64, no. 12, pp. 3430-3443, December 2015.

Jiani Guo and Laxmi Narayan Bhuyan, “Load Balancing in a ClusterBased Web Server for Multimedia Applications”, IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 11, pp. 1321-1334, November 2006.

Fu Yunhai, Ma Lin and Xu Yubin, “A Resource Scheduling Scheme for Spectrum Aggregation in Cognitive Radio Based Heterogeneous Networks”, Key Laboratory of Police Wireless Digital Communication, Ministry of Public Security, vol. 12, no. 9, pp. 100-111, September 2015.

Suraiya Tarannum, Aravinda B, L Nalini, Venugopal K R, L M Patnaik, Routing Protocol for Lifetime Maximization of Wireless Sensor Networks, In IEEE Proceedings of 14th International Conference on Advanced Computing and Communications, IEEE Computer Society Press, Suratkal, India, ISBN: 1-4244-0716-8, pp. 401-406, 20-23rd December, 2006.

Min-You Wu, “On Runtime Parallel Scheduling for Processor Load Balancing”, IEEE Transactions on Parallel and Distributed Systems, vol. 8, no. 2, pp. 173-186, February 1997.

Wenhong Tian, Yong Zhao, Minxian Xu, Yuanliang Zhong and Xiashuang Sun, “A Toolkit for Modeling and Simulation of Real-Time Virtual Machine Allocation in a Cloud Data Center”, IEEE Transactions on Automation Science and Engineering, vol. 12, no. 1, pp. 153-161, January 2015.

Downloads

Published

2017-04-30

How to Cite

Reddy P, M., S. H., M., & K. R., V. (2017). Secure Data Sharing in Cloud Computing: A Comprehensive Review. International Journal of Computer (IJC), 25(1), 80–115. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/916

Issue

Section

Articles