A Novel Attribute Based Keyword Search Scheme for Mobile Cloud Storage

Author(s):  
Sun Lei ◽  
Su Hang ◽  
Zhu Zhiqiang ◽  
Li Zuohui
Author(s):  
Jayesh Sahebrav Patil ◽  
Prashant Mininath Mane

From the time in memorial, Information Security has remained a primary concern and today when most of the sensitive data is stored on Cloud with client organization having lesser control over the stored data, the fundamental way to fix this issue is to encrypt such data. So, a secure user imposed data access control system must be given, before the users outsource any data to the cloud for storage. Attribute Based Encryption (ABE) system is one such asymmetric key based cryptosystem that has received much attention that provides fine-grained access control to data stored on the cloud. In this paper, we propose a more proficient and richer type of Attribute Based Encryption technique (RSABE) that not only considers the Outsourced ABE construction but also address the issue of revocation in case of change of attributes of the group user or organization; once a user is removed from the group, the keys are updated and these new keys are distributed among the existing users also our system supports the Keyword search over encrypted data in the mobile cloud storage. In multi keyword search; data owners and users can generate the keywords index and search trapdoor, respectively, without relying on always online trusted authority. Experimental results prove that the performance of the proposed system is greater than existing system in terms of security, time consumption and memory utilization & data availability.


Author(s):  
Hiroaki Kikuchi ◽  
Kouichi Itoh ◽  
Mebae Ushida ◽  
Yuji Yamaoka ◽  
Takanori Oikawa

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 30444-30457 ◽  
Author(s):  
Shangping Wang ◽  
Duo Zhang ◽  
Yaling Zhang ◽  
Lihua Liu

2014 ◽  
Vol 2014 ◽  
pp. 1-10
Author(s):  
Sun-Ho Lee ◽  
Im-Yeong Lee

Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.


2020 ◽  
Vol 12 (2) ◽  
pp. 72-79
Author(s):  
Nina Fadilah Najwa ◽  
Muhammad Ariful Furqon ◽  
Eki Saputra

Mobile Cloud Computing provides cloud storage services to users inside a cloud. This study focuses on the factors that influence the adoption of mobile cloud storage usage in the higher education. The research methods used in this study include: (1) problem formulation; (2) literature search; and (3) formulation of factors for adopting mobile cloud computing (4) validation and reliability test. The results obtained is a conceptual model that can be tested empirically. The main five factors are: (1) knowledge sharing variables; (2) Perceived usefulness variable (3) trust variable; (4) the attitude towards variable; and (5) the variable of behavioral intention of use. Each variable formulated in the conceptual model will be developed into items that are measurement indicators. The research contribution is in the form of a research model that is useful for empirical research on the factors of adoption of the use of Mobile Cloud Computing in the education sector.


Sign in / Sign up

Export Citation Format

Share Document