{"title":"A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD","authors":"Ewit","doi":"10.30534/ijccn/2018/55722018","DOIUrl":null,"url":null,"abstract":"Cloud computing is used to achieve an effective and economical approach for data sharing among group members with the characters of low maintenance and little management cost. Sharing data while providing privacy-preserving is still a challenging issue, especially for an entrusted cloud due to the collusion attack. First, a secured way for key distribution without any secure communication channels is created. Second, can achieve fine-grained access control. Third, we can protect the scheme from collusion attack. Finally, fine efficiency is achieved which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing, Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijccn/2018/55722018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cloud computing is used to achieve an effective and economical approach for data sharing among group members with the characters of low maintenance and little management cost. Sharing data while providing privacy-preserving is still a challenging issue, especially for an entrusted cloud due to the collusion attack. First, a secured way for key distribution without any secure communication channels is created. Second, can achieve fine-grained access control. Third, we can protect the scheme from collusion attack. Finally, fine efficiency is achieved which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.