Abstract
Cloud computing is encouraging technology to the users, but not satisfactory in trust management, which hinders market growth. While sharing data, owner expected to restrict the authorised or unauthorised users from modification. It is essential to have a robust cryptographic mechanism which can provide fine-grained data access control with confidentiality, authenticity and anonymity at the same time. In addition, framework is needed for analysing trust management systems which can help to develop solutions to challenges such as identification, privacy, integration, security. In this paper, we focus on the data security from the perspective of three stakeholders, i.e. data owner, users and cloud provider. From the surveys analyse, there is still a need for new approach and policies is to be devised for trust, secure data out sourcing, and access policies to be investigated. The first need is to improvise cloud storage service privacy, second is to improvise the cloud data accessing policies and the third need is to integrate of trust computing and access control for identifying cloud reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, K. Liang, J.K. Liu, J. Chen, J. Yu, W. Xie, Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Sec. 11 (2016)
C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, A.Y. Zomaya, An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4) (2016)
M. Marwahe, R. Bedi, Applying encryption algorithm for data security and privacy in cloud computing. Int. J. Comput. Sci. 10(1), 367–370 (2013)
S. Lins, P. Grochol, S. Schneider, A. Sunyaev, Dynamic certification of cloud services: trust, but verify. IEEE Comput. Reliab. Soc. 16, 1540–7993 (2016)
M. Anisetti, C. Ardagna, E. Damiani, F. Gaudenzi, A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. (2016)
Kaushik, C. Gandhi, Cloud data security with hybrid symmetric encryption, in IEEE International Conference on Computational Technology in Infomatics and Communication Technologies (2016)
S. Wang, J. Zhou, J.K. Liu, J. Yu, J. Chen, W. Xie, An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Sec. 11(6) (2016)
C. Yanli, S. Lingling, Y. Geng, Attribute-based access control for multi-authority systems with constant size cipertext in cloud computing computing. IEEE China Commun. 13, 146–162 (2016). https://doi.org/10.1109/cc.2016.7405733
J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. (2015)
W. Li, K. Xue, Y. Xue, J. Hong, TMACS: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans. Parallel Distrib. Syst. (2016)
Z. Yan, M. Wang, Y. Li A.V. Vasilakos, Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. Comput. Soc. 16, 2325–6095 (2016)
Z. Zhu, R. Jiang, A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(1) (2016)
V. Chang, M. Ramachandran, Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. (2015)
K. Yang, X. Jia, K. Ren, Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parallel Distrib. Syst. 26(12) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhote, B.L., Krishna Mohan, G. (2019). Trust and Security to Shared Data in Cloud Computing: Open Issues. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-2673-8_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2672-1
Online ISBN: 978-981-13-2673-8
eBook Packages: EngineeringEngineering (R0)