TY - GEN
T1 - A survey on security over data outsourcing
AU - Thangavel, M.
AU - Varalakshmi, P.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2015/8/28
Y1 - 2015/8/28
N2 - Today's world business depends on outsourcing the computing and storage. Lack of Security on Data Outsourcing is an important issue and becomes one of the wider areas in the Information science research field. The major challenges of outsourcing the data over un-trusted parties are providing confidentiality, maintaining integrity, Access control of multi- owners data, and user revocation of shared data. This paper addresses the analysis of security over data outsourcing on different concerns like Attribute based encryption (ABE), Key management, Anonymous authentication, User revocation and Access control. ABE is one type of a public key cryptosystem which has its more attraction for encrypting data, user revocation issues and access control particularly in case of data outsourcing. Securing and Managing the keys is as important as securing the data. Anonymous authentication is essential for the special cases where the user may wish to store sensitive data without revealing their identity. This paper surveyed all the different types of techniques used to enhance the security of outsourced data.
AB - Today's world business depends on outsourcing the computing and storage. Lack of Security on Data Outsourcing is an important issue and becomes one of the wider areas in the Information science research field. The major challenges of outsourcing the data over un-trusted parties are providing confidentiality, maintaining integrity, Access control of multi- owners data, and user revocation of shared data. This paper addresses the analysis of security over data outsourcing on different concerns like Attribute based encryption (ABE), Key management, Anonymous authentication, User revocation and Access control. ABE is one type of a public key cryptosystem which has its more attraction for encrypting data, user revocation issues and access control particularly in case of data outsourcing. Securing and Managing the keys is as important as securing the data. Anonymous authentication is essential for the special cases where the user may wish to store sensitive data without revealing their identity. This paper surveyed all the different types of techniques used to enhance the security of outsourced data.
KW - Access control
KW - Attribute based Encryption
KW - Authentication
KW - Confidentiality
KW - Data Outsourcing
KW - Integrity
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84954181622&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84954181622&partnerID=8YFLogxK
U2 - 10.1109/ICoAC.2014.7229738
DO - 10.1109/ICoAC.2014.7229738
M3 - Conference contribution
AN - SCOPUS:84954181622
T3 - 6th International Conference on Advanced Computing, ICoAC 2014
SP - 341
EP - 349
BT - 6th International Conference on Advanced Computing, ICoAC 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th International Conference on Advanced Computing, ICoAC 2014
Y2 - 17 December 2014 through 19 December 2014
ER -