Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V4/i11/IRJET-V4I1147.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 256
Towards Secure Data Distribution Systems in Mobile
Cloud Computing: A SURVEY
Anusree Radhakrishnan1 Minu Lalitha Madhav2
PG Scholar1, Asst. Professor2
Dept. of Computer Science & Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha
------------------------------------------------------------------------***-----------------------------------------------------------------------
ABSTRACT-Electronic devices are developing day by day.
Although their need increases compared to a desktop
mobile devices has some of the demerits in the sense that
they have limited computation capability and storage. So
that they cant meet all the needs of the user. The solution
is to integrate the mobile computing with the cloud
computing technology. The new name Mobile cloud
computing (MCC) opens an extended boundary for mobile
users. But when we integrate the cloud computing concept
with the mobile technology, the issues that present in the
cloud computing is still there. Privacy, data integrity,
authentication such terms should be maintained control.
For to ensure it different cryptographic primitives can be
used.
Keywords - MCC, access control , data integrity,
authentication, security
INTRODUCTION
Cloud computing provides immense storage for different
clients. The main advantage of the cloud
is the storage itself. Most of the organizations now a days
depends on the clouds . So that they are not bothered
about the economic cost of the storage hardware. Cloud
provides low cost and good reliability. But here also
when the data is shared we need to ensure that whether
it is shared to the right person. According to a survey
conducted in USA 90% of the citizen uses the cloud
facility for storage purposes. Within this 90% about 80%
of them are worried about the security of their data.
Since the data is completely handled in the cloud the
data security is completely depends on the ability of the
technical team whom are handling the cloud. Any type of
security loop hole will harm the trust of the cloud. Now a
days it is quite common to use the cloud with the help of
the mobile device. By a recent study the cloud will
acquire 90 % of the citizens for their mobile devices. To
offload storage to the cloud, there are many existing
storage services for mobile devices, such as Dropbox,
Box, iCloud, Google Drive, and Skydrive We are
integrating the Mobile computing nad Cloud computing,
surely there will be some security issues. In this survey
we are looking for some of the security preserving
paradigms in MCC environment. The following section is
the literature review section of 5 papers. Along with it
merits and demerits are also mentioned. Last the review
section ends with a conclusion
LITERATURE REVIEW
In [1] Huaquan Wang proposes a provable data
possession protocol. Recently the demand of the cloud
computing increased due to its ability , flexibility and
large storage capacity. . Normally in public clouds the
user keeps the data in the server but they can’t access
the data remotely. Thus, information security is an
important problem in public cloud storage, such as data
confidentiality, integrity, and availability. Some cases the
client can’t check the possession of the data. This paper
tells about a proxy provable data possession (PPDP). In
public clouds, PPDP is a matter of crucial importance
when the client cannot perform the remote data
possession checking. Here it focuses on the PPDP system
model, the security model, and the design method. Based
on the bilinear pairing technique . It Verifies whether the
server possess correct data.
Advantages
 The overhead at the server is low.
 Performance of PDP is bounded by disk I/O and
not by cryptographic computation
Disadvantages
 Performance decreases as the no. of users
increases
Dan Boneh describes a broadcast encryption in [2]. Some
set S of the users will be listening to the broadcast
channel. A broadcaster will encrypt the message. I order
to decrypt it the user can use the private key. We can say
that the system is collusion resistant in the sense that the
users outside the broadcast can’t collude the
information. The broadcaster can encrypt to any subset S
of his choice. In the file system the access control can be
provided by this broadcast encryption.
Advantages
Each user only has to keep a single secret key
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 257
Disadvantages
It needs more storage and time for to implement.
Paper [3] is based on a novel remote based data
possession checking protocol. Most of the data owners
will outsource this data to cloud storage. But the security
of the data is the main issue here. . To solve this problem
some remote data possession checking protocols are
used . But most of the techniques will not support the
data dynamics. RDPC is a solution to the above problem.
And it is based on homomorphic hash function. The
scheme is secure against forgery attack, replay attack,
reply attack. An operation record table is used to track
the files. Optimised implementation of ORT is used here.
It has Less computation + Communication cost. But Need
to access the entire file block for each challenge
[4] describes an attribute based encryption. Hui Cui,
Robert H. Deng describes AB scheme. Here the data
owner will save all the data in the cloud and the data will
be shared with the users having some specific
credentials. In order to save the storage space duplicate
copy of the data should be avoided. But most of the cases
deduplication is not supported. But in this paper
deduplication is supported. Where a private cloud is
responsible for duplicate detection and a public cloud
manages the storage. Compared with other schemes this
AB schemes has some of the advantages. Firstly, it can be
used to confidentially share data with users by specifying
access policies rather than sharing decryption keys.
Secondly, it achieves the standard notion of semantic
security for data confidentiality while existing systems
only achieve it by defining a weaker security notion.
[5] describes Cloud Security Using Service Level
Agreements. It make use of some of the service level
agreements. Users can specify the needs. And with the
help of the security level agreement they can be
provided. Te security level agreement consist of different
security parameters in different point of view.
Advantages
 Customers visually comparing CSPs based on
their offered secSLAs.
Disadvantages
 Nothing mentioned about advanced security
metrics/Cloud secSLA notions
 e.g., uncertainty, end-to-end security evaluation
In [6] Giuseppe Ateniese says about a Proxy
reencryption(PRE). A significant benefit brought by PRE
is that each user only has to keep a single secret key and
does not suffer from the key escrow problem. Concretely,
in a PRE system, a data owner Alice can generate a re-
encryption key to help Bob transform a ciphertext under
her own public key to ciphertext of the same message
under Bob’s public key, such that Bob can decrypt it by
using his own secret key to obtain the original message.
However, the access control provided by a traditional
PRE (including ID-based PRE ) is in an “all or nothing”
manner . Namely, a user with a corresponding re-
encryption key can read all the data of the data owner,
but a user without the re-encryption key cannot read any
private data of the data owner. This is not applicable to
the case that the data owner only wants to share part of
his data with others. In order to realize flexible access
control, a new variant of PRE can be used
Advantages
a) Implementation is simple
Disadvantage
a) Some area is error prone
CONCLUSION
MCC is an evolving technology in which many more
features are adding to it.By analysing these features we
can conclude that the only problem with the system is of
security in data sharing. MCC has to follow a number of
features such as data sharing access control,
authentication ,integrity etc.
But we cant design one system with all these features.
For all security related frameworks the main purpose
should be to ensure the security of data. A number of
security frameworks has already been designed to this
proposed. By analysing 6 of these methods we could
conclude that a lot of research are going on in the field of
mobile cloud computing
REFERENCES
[1] Huaqun Wang, “Proxy Provable Data Possession in
Public Clouds” JOURNAL OF L ATEX CLASS FILES, VOL. 6,
NO. 1,.
[2] Dan Boneh, Brent Waters, Craig Genry, Collusion
Resistant Broadcast Encryption With Short Ciphertexts
and Private Keys,” in ICNP ’05, 2005.
[3] Hao Yan, Jiguo Li, Jinguang Han, “A Novel Efficient
Remote Data Possession Checking Protocol in Cloud
Storage ” Carnegie Mellon University Research Showcase
@ CMU.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 258
[4] Hui Cui, Robert H. Deng, Yingjiu Li, and Guowei Wu,
“Attribute-Based Storage Supporting Secure
Deduplication of Encrypted Data in Cloud,” JOURNAL OF
L ATEX CLASS FILES, VOL. , NO. , MONTH 2016.
[5] Y. Xiang, W. Zhou, and M. Guo, “Cloud Security Using
Service Level Agreements. Parallel Distrib. Syst., vol. 20,
no. 4, pp. 567–580, 2009.
[6] Giuseppe Ateniese, Kevin Fu, Matthew Green, and
Susan Hohenberger. “Improved proxy re-encryption
schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 9:1–30, February 2016..

Recomendados

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
103 vistas4 diapositivas
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
34 vistas4 diapositivas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
59 vistas3 diapositivas
H1803035056 por
H1803035056H1803035056
H1803035056IOSR Journals
149 vistas7 diapositivas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
64 vistas4 diapositivas
Survey on Data Security with Time Constraint in Clouds por
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
24 vistas4 diapositivas

Más contenido relacionado

La actualidad más candente

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
30 vistas3 diapositivas
Accessing secured data in cloud computing environment por
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
348 vistas10 diapositivas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
21 vistas3 diapositivas
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... por
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
35 vistas9 diapositivas
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl... por
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
120 vistas14 diapositivas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
10 vistas22 diapositivas

La actualidad más candente(20)

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal30 vistas
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal348 vistas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal21 vistas
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... por IRJET Journal
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal35 vistas
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl... por 1crore projects
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects120 vistas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal10 vistas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ... por IJSRED
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED151 vistas
Secure Medical Data Computation using Virtual_ID Authentication and File Swap... por IJASRD Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal41 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por IRJET Journal
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal298 vistas
A Novel privacy preserving public auditing for shared data in cloud por JAVVAJI VENKATA RAO
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO1.2K vistas
Location Based Encryption-Decryption Approach for Data Security por Editor IJCATR
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR577 vistas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 vistas
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU... por Migrant Systems
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems 1.5K vistas
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud por IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal18 vistas
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal11 vistas
3 ijece 1 ed iqbal qc por IAESIJEECS
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS26 vistas
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography por IRJET Journal
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal171 vistas
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage por IRJET Journal
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal71 vistas
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud por IRJET Journal
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal28 vistas

Similar a Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey

Efficient and Empiric Keyword Search Using Cloud por
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
0 vistas5 diapositivas
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
294 vistas6 diapositivas
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... por
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
130 vistas4 diapositivas
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... por
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
67 vistas15 diapositivas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
35 vistas6 diapositivas
IRJET- Secure Cloud Data Using Attribute Based Encryption por
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
20 vistas5 diapositivas

Similar a Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey(20)

Efficient and Empiric Keyword Search Using Cloud por IRJET Journal
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal0 vistas
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 vistas
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... por IRJET Journal
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal130 vistas
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... por cscpconf
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf67 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
IRJET- Secure Cloud Data Using Attribute Based Encryption por IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal20 vistas
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C... por IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal31 vistas
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC por IRJET Journal
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal36 vistas
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline275 vistas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor22 vistas
IRJET-Auditing and Resisting Key Exposure on Cloud Storage por IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal31 vistas
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr... por IRJET Journal
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal62 vistas
IRJET- Securing Cloud Data Under Key Exposure por IRJET Journal
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal203 vistas
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham por IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal3 vistas
IRJET- Secure Data Protection in Cloud Computing por IRJET Journal
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal12 vistas
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por IRJET Journal
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal21 vistas
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing por ijtsrd
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
ijtsrd45 vistas
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 vistas

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 vistas7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vistas7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 vistas5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vistas11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vistas6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vistas5 diapositivas

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal44 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vistas

Último

DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...Anowar Hossain
12 vistas34 diapositivas
Multi-objective distributed generation integration in radial distribution sy... por
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...IJECEIAES
15 vistas14 diapositivas
Activated sludge process .pdf por
Activated sludge process .pdfActivated sludge process .pdf
Activated sludge process .pdf8832RafiyaAltaf
8 vistas32 diapositivas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...AltinKaradagli
6 vistas10 diapositivas
Machine Element II Course outline.pdf por
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdfodatadese1
8 vistas2 diapositivas
Plumbing por
PlumbingPlumbing
PlumbingIwiss Tools Co.,Ltd
15 vistas14 diapositivas

Último(20)

DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain12 vistas
Multi-objective distributed generation integration in radial distribution sy... por IJECEIAES
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES15 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 vistas
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese18 vistas
Design and analysis of a new undergraduate Computer Engineering degree – a me... por WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy656 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy29 vistas
Machine learning in drug supply chain management during disease outbreaks: a ... por IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES10 vistas
An approach of ontology and knowledge base for railway maintenance por IJECEIAES
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenance
IJECEIAES12 vistas
Dynamics of Hard-Magnetic Soft Materials por Shivendra Nandan
Dynamics of Hard-Magnetic Soft MaterialsDynamics of Hard-Magnetic Soft Materials
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan14 vistas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome23 vistas
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 vistas

Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 256 Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SURVEY Anusree Radhakrishnan1 Minu Lalitha Madhav2 PG Scholar1, Asst. Professor2 Dept. of Computer Science & Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha ------------------------------------------------------------------------***----------------------------------------------------------------------- ABSTRACT-Electronic devices are developing day by day. Although their need increases compared to a desktop mobile devices has some of the demerits in the sense that they have limited computation capability and storage. So that they cant meet all the needs of the user. The solution is to integrate the mobile computing with the cloud computing technology. The new name Mobile cloud computing (MCC) opens an extended boundary for mobile users. But when we integrate the cloud computing concept with the mobile technology, the issues that present in the cloud computing is still there. Privacy, data integrity, authentication such terms should be maintained control. For to ensure it different cryptographic primitives can be used. Keywords - MCC, access control , data integrity, authentication, security INTRODUCTION Cloud computing provides immense storage for different clients. The main advantage of the cloud is the storage itself. Most of the organizations now a days depends on the clouds . So that they are not bothered about the economic cost of the storage hardware. Cloud provides low cost and good reliability. But here also when the data is shared we need to ensure that whether it is shared to the right person. According to a survey conducted in USA 90% of the citizen uses the cloud facility for storage purposes. Within this 90% about 80% of them are worried about the security of their data. Since the data is completely handled in the cloud the data security is completely depends on the ability of the technical team whom are handling the cloud. Any type of security loop hole will harm the trust of the cloud. Now a days it is quite common to use the cloud with the help of the mobile device. By a recent study the cloud will acquire 90 % of the citizens for their mobile devices. To offload storage to the cloud, there are many existing storage services for mobile devices, such as Dropbox, Box, iCloud, Google Drive, and Skydrive We are integrating the Mobile computing nad Cloud computing, surely there will be some security issues. In this survey we are looking for some of the security preserving paradigms in MCC environment. The following section is the literature review section of 5 papers. Along with it merits and demerits are also mentioned. Last the review section ends with a conclusion LITERATURE REVIEW In [1] Huaquan Wang proposes a provable data possession protocol. Recently the demand of the cloud computing increased due to its ability , flexibility and large storage capacity. . Normally in public clouds the user keeps the data in the server but they can’t access the data remotely. Thus, information security is an important problem in public cloud storage, such as data confidentiality, integrity, and availability. Some cases the client can’t check the possession of the data. This paper tells about a proxy provable data possession (PPDP). In public clouds, PPDP is a matter of crucial importance when the client cannot perform the remote data possession checking. Here it focuses on the PPDP system model, the security model, and the design method. Based on the bilinear pairing technique . It Verifies whether the server possess correct data. Advantages  The overhead at the server is low.  Performance of PDP is bounded by disk I/O and not by cryptographic computation Disadvantages  Performance decreases as the no. of users increases Dan Boneh describes a broadcast encryption in [2]. Some set S of the users will be listening to the broadcast channel. A broadcaster will encrypt the message. I order to decrypt it the user can use the private key. We can say that the system is collusion resistant in the sense that the users outside the broadcast can’t collude the information. The broadcaster can encrypt to any subset S of his choice. In the file system the access control can be provided by this broadcast encryption. Advantages Each user only has to keep a single secret key
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 257 Disadvantages It needs more storage and time for to implement. Paper [3] is based on a novel remote based data possession checking protocol. Most of the data owners will outsource this data to cloud storage. But the security of the data is the main issue here. . To solve this problem some remote data possession checking protocols are used . But most of the techniques will not support the data dynamics. RDPC is a solution to the above problem. And it is based on homomorphic hash function. The scheme is secure against forgery attack, replay attack, reply attack. An operation record table is used to track the files. Optimised implementation of ORT is used here. It has Less computation + Communication cost. But Need to access the entire file block for each challenge [4] describes an attribute based encryption. Hui Cui, Robert H. Deng describes AB scheme. Here the data owner will save all the data in the cloud and the data will be shared with the users having some specific credentials. In order to save the storage space duplicate copy of the data should be avoided. But most of the cases deduplication is not supported. But in this paper deduplication is supported. Where a private cloud is responsible for duplicate detection and a public cloud manages the storage. Compared with other schemes this AB schemes has some of the advantages. Firstly, it can be used to confidentially share data with users by specifying access policies rather than sharing decryption keys. Secondly, it achieves the standard notion of semantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. [5] describes Cloud Security Using Service Level Agreements. It make use of some of the service level agreements. Users can specify the needs. And with the help of the security level agreement they can be provided. Te security level agreement consist of different security parameters in different point of view. Advantages  Customers visually comparing CSPs based on their offered secSLAs. Disadvantages  Nothing mentioned about advanced security metrics/Cloud secSLA notions  e.g., uncertainty, end-to-end security evaluation In [6] Giuseppe Ateniese says about a Proxy reencryption(PRE). A significant benefit brought by PRE is that each user only has to keep a single secret key and does not suffer from the key escrow problem. Concretely, in a PRE system, a data owner Alice can generate a re- encryption key to help Bob transform a ciphertext under her own public key to ciphertext of the same message under Bob’s public key, such that Bob can decrypt it by using his own secret key to obtain the original message. However, the access control provided by a traditional PRE (including ID-based PRE ) is in an “all or nothing” manner . Namely, a user with a corresponding re- encryption key can read all the data of the data owner, but a user without the re-encryption key cannot read any private data of the data owner. This is not applicable to the case that the data owner only wants to share part of his data with others. In order to realize flexible access control, a new variant of PRE can be used Advantages a) Implementation is simple Disadvantage a) Some area is error prone CONCLUSION MCC is an evolving technology in which many more features are adding to it.By analysing these features we can conclude that the only problem with the system is of security in data sharing. MCC has to follow a number of features such as data sharing access control, authentication ,integrity etc. But we cant design one system with all these features. For all security related frameworks the main purpose should be to ensure the security of data. A number of security frameworks has already been designed to this proposed. By analysing 6 of these methods we could conclude that a lot of research are going on in the field of mobile cloud computing REFERENCES [1] Huaqun Wang, “Proxy Provable Data Possession in Public Clouds” JOURNAL OF L ATEX CLASS FILES, VOL. 6, NO. 1,. [2] Dan Boneh, Brent Waters, Craig Genry, Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys,” in ICNP ’05, 2005. [3] Hao Yan, Jiguo Li, Jinguang Han, “A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage ” Carnegie Mellon University Research Showcase @ CMU.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 258 [4] Hui Cui, Robert H. Deng, Yingjiu Li, and Guowei Wu, “Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud,” JOURNAL OF L ATEX CLASS FILES, VOL. , NO. , MONTH 2016. [5] Y. Xiang, W. Zhou, and M. Guo, “Cloud Security Using Service Level Agreements. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567–580, 2009. [6] Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger. “Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9:1–30, February 2016..