PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud

0
740
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud

PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud

Abstract

Recently, many companies have moved their data into the cloud using file syncing and sharing (FSS) services that have been deployed for mobile users. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud However, Bring-Your-Own-Device (BYOD) solutions for increasingly deployed mobile devices have in fact also raised a new challenge as to how to prevent users from abussing the FSS service.

In this PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud paper, we address this issue by using a new system model involving approaches to anomaly detection, tracing, and revocation. 
 

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
 
RAM                      : 256 MB(min)
 
Hard Disk              : 20 GB
 
Floppy Drive          : 1.44 MB
 
Key Board             : Standard Windows Keyboard
 
Mouse                  : Two or Three Button Mouse
 
Monitor                : SVGA
 
S/W System Configuration
 
 
Platform                     :  cloud computing

 
Operating system       : Windows Xp,7,
 
Server                       : WAMP/Apache
 
Working on                : Browser Like Firefox, IE

Conclusion

In this paper we focus on protecting data outsourcing privacy and preventing player abuse in cloud file syncing and sharing services. We highlight the development of a group-oriented cryptosystem with digital forensics, especially for tracing and revoking methods that can ensure player / editor security. Based on this cryptosystem, we are presenting a new secure service model to provide a framework forensic analysis to guide investigations.