Sharing Private Data with Group of Users via Cloud in a Secure Way

V Naga Venkata Ramana, P Rama Krishna

Abstract


In the present days, cloud computing gives us an effective approach to impart data among cloud users to low support. In any case, in multiowner group, there is a significant issue with protecting data and personality security because of continuous change of enrollment some patterns are opening up the time of Cloud Computing, which is an Internet-based change and use of computer innovation. Security must be in given due significance for the cloud data with most extreme care to the data and certainty to the data possessed In this venture ,we are proposing a protected multi-proprietor sharing plan, for dynamic groups in the cloud. We are utilizing group mark and encryption strategies. One of the greatest worries with cloud data stockpiling is that of data honesty confirmation at untrusted servers. To safeguard data security, an essential arrangement is to encode data files, and afterward transfer the scrambled data into the cloud. To determine this issue as of late the best effective technique MONA displayed for secured multi proprietor data sharing. In our venture, we have expelled the issue that happened in existing framework. In existing framework at whatever point there is a denial of part shape group. Manager needs to produce another key and after that disseminate to different individuals, this was an exceptionally dreary work, so we utilize another procedure of group mark so that the revoked part is not ready to transfer or download files. Presently there is no requirement for producing new key each time at whatever point there is a repudiation of individuals.


References


Zhongma Zhu, Rui Jiang, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud†10.1109/TPDS.2015.2388446, IEEE Transactions on Parallel and Distributed Systems

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “A View of Cloud Computing,†Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.2010.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,†Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.

Shucheng Yu, Cong Wang, Kui Ren, and Weijing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,†Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,†Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yang, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,†IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1182-1191, June 2013.

D. Boneh, X. Boyen, and E. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,†Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp. 440-456, 2005.

Lan Zhou, Vijay Varadharajan, and Michael Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage,†IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1947-1960, December 2013.

M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policy based content.

Boyang Wang, Hui Li, Xuefeng Liu,Fenghua Li, and Xiaoqing Li, “Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloudâ€, IEEE Jour. Of Comm. And Netw.,Vol. 16, No. 6, Dec 2014


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â