Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2019, Article ID 9852472, 8 pages
Research Article

An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment

1School of Computing Science & Engineering, VIT, Chennai, India
2School of Computing, SASTRA University, Thanjavur, India

Correspondence should be addressed to K. V. Pradeep;

Received 18 February 2019; Revised 29 April 2019; Accepted 19 May 2019; Published 27 June 2019

Guest Editor: Arash H. Lashkari

Copyright © 2019 K. V. Pradeep et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Mell and T. Grance, The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2009,
  2. G. Fowler and B. Worthen, “The Internet industry is on a cloud–whatever that may mean,” Wall Street Journal, vol. 26, 2009. View at Google Scholar
  3. N. Leavitt, Is Cloud Computing Really Ready for Prime Time? IEEE Computer Society Press, Los Alamitos, CA, USA, 2009.
  4. L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008. View at Google Scholar
  5. L. Youseff, M. Butrico, and D. Da Silva, “Toward a unified ontology of cloud computing,” in Proceedings of the 2008 Grid Computing Environments Workshop IEEE, Austin, TX, USA, September 2008.
  6. A. Gholami and E. Laure, “Security and privacy of sensitive data in cloud computing: a survey of recent developments,” Computer Science and Information Technology, vol. 5, 2016. View at Publisher · View at Google Scholar
  7. R. P. Padhy, M. R. Patra, and S. C. Satapathy, “Cloud computing security issues and research challenges,” International Journal of Computer Science and Information Technology & Security, vol. 1, no. 2, pp. 136–146, 2012. View at Publisher · View at Google Scholar
  8. K. Manpreet and H. Singh, “A review of cloud computing security issues,” International Journal of Advances in Engineering and Technology, vol. 8, no. 3, p. 397, 2015. View at Google Scholar
  9. H. Suo, Z. Liu, J. Wan, and K. Zhou, “Security and privacy in mobile cloud computing,” in Proceedings of 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 655–659, Sardinia, 2013.
  10. S. Nepal, C. Friedrich, Henry et al., “A secure storage service in the hybrid cloud,” in Proceedings of 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), New York, NY, USA, 2011.
  11. Y. Zhang, Q. Chen, and S. Zhong, “Privacy-preserving data aggregation in mobile phone sensing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 980–992, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Kwon, C. Hahn, D. Koo, and J. Hur, “Scalable and reliable key management for secure deduplication in cloud storage,” in Proceedings of the IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 2017.
  13. K. V. Pradeep and V. Vijayakumar, “Survey on the key management for securing the cloud,” Procedia Computer Science, vol. 50, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proceedings of Advances in Cryptology (Eurocrypt ‘99), pp. 223–238, Prague, Czech Republic, May 1999.
  15. Z. E. Dawahdeh, S. N. Yaakob, and A. M. Sagheer, “Modified ElGamal elliptic curve cryptosystem using hexadecimal representation,” Indian Journal of Science and Technology, vol. 8, no. 15, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  16. A. R. Buchade and R. Ingle, “Key management for cloud data storage: methods and comparisons,” 2014. View at Google Scholar
  17. H. Nayana and S. S. Manvi, “Thesis proposal summary: key management authentication and non repudiation for information transaction in vehicular cloud environments,” in Proceedings of the 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) IEEE, Bangalore, India, October 2016.
  18. O. Ethelbert, F. F. Moghaddam, P. Wieder, and R. Yahyapour, “A JSON token-based authentication and access management schema for Cloud SaaS applications,” in Proceedings of the 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE, Prague, Czech Republic, August 2017.
  19. R. Chandramouli, S. Chokhani, and M. Iorga, “Cryptographic key management issues & challenges in cloud services,” NIST Interagency or Internal Report 7956, 2013.
  20. H. Wang, Y. Zhang, H. Xiong, and B. Qin, “Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme,” IET Information Security, vol. 6, no. 1, pp. 20–27, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. Q. Wu, B. Qin, L. Zhang, J. Domingo-Ferrer, and J. A. Manjón, “Fast transmission to remote cooperative groups: a new key management paradigm,” IEEE/ACM Transactions on Networking, vol. 21, pp. 621–633, 2013. View at Google Scholar
  22. S. Rajarajeswari and K. Somasundaram, “Data confidentiality and privacy in cloud computing,” Indian Journal of Science and Technology, vol. 9, no. 4, pp. 1–8, 2016. View at Publisher · View at Google Scholar
  23. R. Sugumar and S. B. S. Imam, “The symmetric encryption algorithm to secure outsourced data in public cloud storage,” Indian Journal of Science and Technology, vol. 8, no. 23, pp. 1–5, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Saikeerthana and A. Umamakeswari, “Secure data storage and data retrieval in cloud storage using cipher policy attribute based encryption,” Indian Journal of Science and Technology, vol. 8, no. S9, pp. 318–325, 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. L. Harn, C.-C. Chang, and H.-L. Wu, “An anonymous multi-receiver encryption based on RSA,” Journal of Network Security, vol. 15, pp. 307–312, 2013. View at Google Scholar
  26. C. Alliance, “Security guidance for critical areas of focus in cloud computing v3.0,” Cloud Security Alliance, vol. 15, 2011. View at Google Scholar
  27. J. Wayne and G. Timothy, NIST Guidelines on Security and Privacy in Public Cloud Computing, Draft Special Publication, NIST, Gaithersburg, MD, USA, 2011.
  28. S. Dorwani, J. Aghav, and B. Bhutkar, “NoSQL: features, classification, and comparison,” in Proceedings of the IEECS-2013, Coimbatore, India, April 2016.
  29. L. Harn and C.-F. Hsu, “A Practical Hybrid Group Key Establishment for Secure Group Communications,” The Computer Journal, vol. 60, no. 11, pp. 1582–1589, 2017. View at Google Scholar
  30. K. Bicakci, D. Deniz Yavuz, and S. Gurkan, “TwinCloud: secure cloud sharing without explicit key management,” in Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, October 2016.
  31. H. Dinh, A. Dworkin, C. O’Neill et al., “Omnibox: Efficient cloud storage by evaluating dropbox and box,” in Proceedings of the 2017 24th International Conference on Telecommunications (ICT) IEEE, Limassol, Cyprus, May 2017.
  32. I. Indu, P. M. Rubesh Anand, and S. P. Shaji, “Secure file sharing mechanism and key management for the mobile cloud computing environment,” IJST, vol. 9, 2016. View at Google Scholar
  33. G. Jindi, D. Zishan, and S. Lei, “Research on key management infrastructure in cloud computing environment,” in Proceedings of the International Conference on Grid and Cooperative Computing, pp. 404–407, Nanjing, China, November 2010.
  34. A. Kumar, B. G. Lee, H. J. Lee et al., “Secure storage and access of data in cloud computing,” in Proceedings of the 2012 International Conference on ICT Convergence (IC-TC), pp. 336–339, New York, NY, USA, October 2012.
  35. F. H. Chen, Y. Liu, and Y. U. Qi, “Key management scheme of personal cloud computing,” Modern Computer, vol. 30, 2011. View at Google Scholar
  36. S. D. C. D. Vimercati, S. Foresti, S. Jajodia et al., “Overencryption: management of access control evolution on outsourced data,” in Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria, September 2007.
  37. A. Armando, R. Carbone, L. Compagna, J. Cuéllar, G. Pellegrino, and A. Sorniotti, “An authentication flaw in browser-based single sign-on protocols: impact and remediations,” Computers & Security, vol. 33, pp. 41–58, 2013. View at Publisher · View at Google Scholar · View at Scopus
  38. D. Yan and X. Zhou, “Secure group communications using key hypergraphs,” Journal of Computational Information Systems, vol. 8, pp. 5035–5042, 2012. View at Google Scholar