A Survey on collusion resistant data sharing in cloud environment

  • Authors

    • N Rajkumar
    • E Kannan
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.13300
  • .
  • Cloud Computing is an emerging technology that uses the internet and remote servers to save information and application. Cloud computing enables customers and organizations to utilize applications without establishment and access their own documents at any computer with internet access. Collusion Resistant Secured the way to deal the fulfillment of an abnormal state of security with complete protection. A large portion of these techniques depend on a presumption that semi-trusted and arrangement is absent. In this paper, we concentrate on the issue of conspiracies, in which a few gatherings may connive and share their record to find the private data of different gatherings. The other related works better than this is more secure. This paper reveals an overview and study of collusion resistance techniques in more secure and efficient way for data sharing in cloud storage.

  • References

    1. [1] Samuel Shepard+, Ray Kresman*, Larry Dunning* .Data Mining and Collusion Resistance, Proceedings of the World Congress on Engineering 2009 Vol I WCE 2009, July 1 - 3, 2009, London, U.K.

      [2] Bin Yang Collusion-Resistant Privacy-Preserving Data Mining,Bin YangGraduate School of Information Science and Technology University of Tokyo, Japan yangbin@r.dl.itc.utokyo.ac.jp

      [3] Wei Yang1,2,∗, Liusheng Huang1 Hamburger Attack: A Collusion Attack againstPrivacy-preserving Data Aggregation Schemes. 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)

      [4] Renren Dong. Trust Enabled Secure Multiparty Computation. 2010 14th International Conference Information Visualisation

      [5] Dipali S. Kasunde. Verification of Multi-Owner Shared Data with Collusion Resistant User Revocation in Cloud, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

      [6] You wen Zhu, Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited, College of Computer, Nanjing University of Aeronautics and Astronautics, Nanjing, China

      [7] Larry A. Privacy Preserving Data Sharing With Anonymous ID Assignment, ieee transactions on information forensics and security, vol. 8, no. 2, february 2013

      [8] D. Beaver, S. Micali, and P. Rogaway, “The round complexity of secure protocols,†in STOC. ACM, 1990.

      [9] A. Ben-David, N. Nisan, and B. Pinkas, “Fairplaymp: a system for secure multi-party computation,†in CCS. ACM, 2008.

      [10] D. Boneh, “The decision diffie-hellman problem,†Algorithmic Number Theory, 1998.

  • Downloads

  • How to Cite

    Rajkumar, N., & Kannan, E. (2018). A Survey on collusion resistant data sharing in cloud environment. International Journal of Engineering & Technology, 7(2.20), 224-226. https://doi.org/10.14419/ijet.v7i2.20.13300