Secure and Flexible Data Sharing for Dynamic Groups in the Cloud

Size: px
Start display at page:

Download "Secure and Flexible Data Sharing for Dynamic Groups in the Cloud"

Transcription

1 Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Srinivas Tutigunta. 1, K. Ravi Chadaran 2 1 Dept. of CSE, Nova College of Engineering & Technology, Jangareddy Gudem, A.P, India 2 Associate Professor, Nova College of Engineering & Technology, Jangareddy Gudem, A.P, India ABSTRACT With the character of low support, cloud computing gives a prudent and productive answer for imparting gathering asset among cloud clients. Sadly, imparting information in a multi-owner way while saving information and personality protection from an untrusted cloud is still a testing issue, because of the incessant change of the enrollment. In this paper, we propose a safe multi owner information imparting plan, named Mona, for element bunches in the cloud. By leveraging gathering signature and element show encryption procedures, any cloud client can secretly impart information to others. In the mean time, the capacity overhead and encryption reckoning expense of our plan are autonomous with the quantity of denied clients. Moreover, we dissect the security of our plan with thorough evidences, and show the effectiveness of our plan in analyses. Index Terms: Cloud computing, data sharing, privacy-preserving, access control, dynamic groups. I. INTRODUCTION Cloud computing is perceived as an option to conventional data innovation [1] because of its inborn asset imparting and low-upkeep qualities. In cloud computing, the cloud service providers (CSPs, for example, Amazon, have the capacity convey different administrations to cloud clients with the assistance of effective datacenters. By moving the nearby information administration frameworks into cloud servers, clients can appreciate astounding administrations and recovery huge speculations on their neighborhood frameworks. A standout amongst the most major administrations offered by cloud suppliers is information stockpiling. Given us a chance to consider a viable information application. An organization permits its staffs in the same gathering or office to store and offer records in the cloud. By using the cloud, the staffs can be totally discharged from the troublesome nearby information stockpiling and upkeep. On the other hand, it likewise represents a critical danger to the secrecy of those put away documents. Particularly, the cloud servers oversaw by cloud suppliers are not completely trusted by clients while the information records put away in the cloud may be delicate and secret, for example, strategies for success. To safeguard information security, a fundamental arrangement is to encode information records, and afterward transfer the scrambled information into the cloud [2]. Sadly, planning a proficient and secure information imparting plan for gatherings in the cloud is not a simple errand because of the accompanying testing issues. A few security plans for information offering on untrusted servers have been proposed [4], [5], [6]. In these methodologies, information managers store the encoded information documents in untrusted stockpiling and circulate the comparing decoding 200

2 keys just to approved clients. Notwithstanding, the complexities of client cooperation and denial in these plans are directly expanding with the quantity of information managers and the quantity of renounced clients, separately. By setting a gathering with a solitary property, Lu et al. [7] proposed a safe provenance plan focused around the ciphertextarrangement trait based encryption method [8], which permits any part in a gathering to impart information to others. Nonetheless, the issue of client denial is not tended to in their plan. Yu et al. [3] exhibited an adaptable and fine-grained information access control conspire in distributed computing focused around the key approach trait based encryption (KP-ABE) procedure [9]. Our commitments. To illuminate the difficulties exhibited above, we propose Mona, a safe multimanager information offering plan for element amasses in the cloud. The fundamental commitments of this paper include: 1. We propose a safe multi-manager information imparting plan. It infers that any client in the gathering can safely impart information to others by the untrusted cloud. 2. Our proposed plan has the capacity help element assembles productively. Particularly, new conceded clients can specifically unscramble information records transferred before their support without reaching with information managers. Client repudiation can be effortlessly accomplished through a novel disavowal rundown without upgrading the mystery keys of the remaining clients. The size and processing overhead of encryption are steady and free with the quantity of repudiated clients. 3. We give secure and security safeguarding access control to clients, which ensures any part in a gathering to namelessly use the cloud asset. In addition, the genuine personalities of information holders can be uncovered by the gathering supervisor when debate happen. 4. We give thorough security examination, and perform far reaching reproductions to exhibit the productivity of our plan as far as capacity and computation overhead. The rest of this paper is sorted out as takes after: Section 2 diagrams the related work. In Section 3, a few preliminaries and cryptographic primitives are evaluated. In Section 4, we portray the framework model and our configuration objectives. In Section 5, the proposed plan is displayed in point of interest, emulated by the security examination and the execution investigation in Sections 6 and 7. At long last, we finish up the paper in Section 8. II. BACKGROUND AND RELATED WORK In [4], Kallahalla et al. proposed a cryptographic stockpiling framework that empowers secure record offering on untrusted servers, named Plutus. By isolating records into filegroups and scrambling every filegroup with a special document piece key, the information manager can impart the filegroups to others through conveying the relating lockbox key, where the lockbox key is utilized to encode the record square keys. In [5], records put away on the untrusted server incorporate two sections: document metadata and record information. The record metadata infers the right to gain entrance control data including an arrangement of scrambled key obstructs, each of which is encoded under general society key of approved clients. Along these lines, the measure of the record metadata is corresponding to the quantity 201

3 of approved clients. The client denial in the plan is an unmanageable issue particularly for substantial scale imparting, since the document metadata needs to be redesigned. In their augmentation form, the NNL development [10] is utilized for productive key renouncement. 1. Any client in the gathering can store and offer information documents with others by the cloud. 2. The encryption unpredictability and size of ciphertexts are free with the quantity of renounced clients in the framework. Ateniese et al. [6] leveraged intermediary reencryptions to secure conveyed stockpiling. Particularly, the information manager scrambles pieces of substance with one of a kind and symmetric substance keys, which are further scrambled under an expert open key. For access control, the server utilizes intermediary cryptography to specifically reencrypt the fitting substance key(s) from the expert open key to an allowed client's open key. In [3], Yu et al. introduced an adaptable and finegrained information access control conspire in distributed computing focused around the KPABE method. The information holder utilizes an irregular key to scramble a document, where the arbitrary key is further scrambled with a set of traits utilizing KP- ABE. At that point, the gathering chief allocates a right to gain entrance structure and the comparing mystery key to approved clients, such that a client can just unscramble a ciphertext if and if the information document properties fulfill the right to gain entrance structure. From the above investigation, we can watch that how to safely impart information documents in a various holder way for element gatherings while protecting personality protection from an untrusted cloud stays to be a testing issue. In this paper, we propose a novel Mona convention for secure information offering in distributed computing. Contrasted and the current works, Mona offers novel peculiarities as takes after: 3. Client renouncement can be attained without overhauling the private keys of the remaining clients. 4. Another client can specifically decode the documents put away in the cloud before his support. III. PRELIMINARIES 1. Group Signature The idea of gathering marks was initially presented in [15] by Chaum and van Heyst. By and large, a gathering mark plan permits any part of the gathering to sign messages while keeping the character mystery from verifiers. Moreover, the assigned gathering chief can uncover the character of the signature's originator when a debate happens, which is indicated as traceability. In this paper, a variation of the short gathering mark plan [12] will be utilized to accomplish unnamed access control, as it backings effective participation denial. 2. Dynamic Broadcast Encryption Broadcast encryption [16] empowers a supporter to transmit encoded information to a set of clients so that just an advantaged subset of clients can unscramble the information

4 Fig. 1: System model. Other than the above attributes, element show encryption additionally permits the gathering administrator to rapidly incorporate new parts while safeguarding long ago processed data, i.e., client decoding keys require not be recomputed, the morphology and size of ciphertexts are unaltered and the gathering encryption key obliges no alteration. The primary formal definition and development of element telecast encryption are presented focused around the bilinear matching system in [14], which will be utilized as the premise for record offering in dynamic gatherings. IV. SYSTEM MODEL AND DESIGN GOALS 1 System Model We consider a distributed computing construction modeling by joining with a sample that an organization utilizes a cloud to empower its staffs in the same gathering or office to impart records. The framework model comprises of three separate substances: the cloud, a gathering supervisor (i.e., the organization administrator), and countless parts (i.e., the staffs) as represented in Fig. 1. Cloud is worked by Csps and gives evaluated rich stockpiling administrations. Notwithstanding, the cloud is not completely trusted by clients since the Csps are liable to be outside of the cloud clients' trusted space. Like [3], [7], we expect that the cloud server is fair yet inquisitive. That is, the cloud server won't malevolently erase or change client information because of the assurance of information reviewing plans [17], [18], however will attempt to take in the substance of the put away information and the characters of cloud clients. 2 Design Goals In this area, we portray the primary outline objectives of the proposed plan including access control, information secrecy, namelessness and traceability, and productivity as takes after: Access control: The prerequisite of access control is twofold. To begin with, gathering parts have the capacity utilize the cloud asset for information operations. Second, unapproved clients can't get to the cloud asset whenever, and denied clients will be unequipped for utilizing the cloud again once they are repudiated. Data confidentiality: Data classifiedness queries that unapproved clients including the cloud are unequipped for taking in the substance of the put away information. An imperative and testing issue for information classifiedness is to keep up its accessibility for element bunches. Anonymity and traceability: Anonymity ensures that gathering parts can get to the cloud without uncovering the genuine personality. Despite the fact that secrecy speaks to a successful insurance for client character, it additionally represents a potential inside assault danger to the framework. Efficiency: The effectiveness is characterized as takes after: Any gathering part can store and offer information documents with others in the gathering by the cloud. Client disavowal can be attained without including the remaining clients. VI. THE PROPOSED SCHEME: MONA 1 Overview To accomplish secure information imparting for element bunches in the cloud, we hope to join the gathering signature and element show encryption systems. Uncommonly, the gathering mark plan 203

5 empowers clients to secretly utilize the cloud assets, and the element show encryption system permits information managers to safely impart their information records to others including new joining clients. Shockingly, every client needs to register repudiation parameters to secure the secrecy from the repudiated clients in the element telecast encryption plan, which brings about that both the reckoning overhead of the encryption and the span of the ciphertext increment with the quantity of renounced clients. Ar xr tr Pr Zr trl Randomly choosing two elements P, G belongs to G1. Next to publishing the System parameters. 2.2 User Registration For the enrollment of client i with personality Idi, the gathering administrator arbitrarily chooses a number (Ai,Xi,IDi) and figures Ai;Bi as the accompanying comparison: To handle this testing issue, we let the gathering director figure the disavowal parameters and make the result open accessible by relocating them into the cloud. Such an outline can essentially decrease the reckoning overhead of clients to encode documents and the ciphertext size. 2. Scheme Description This area depicts the subtle elements of Mona including system introduction, client enlistment, client denial, document era, record erasure, document access and traceability. 2.1 System Initialization The group manager takes charge of system initialization as follows: Generating a bilinear map group system S=(q,G1,G2,e(.,.)). Selecting two random elements H;H0 2 G1 along with two random numbers. In addition the group manager computes H1= sigma1 H0 H1 = sigma2 Ho belongs to G1. TABLE 1 Revocation List IDgroup A1 x1 t1 P1 A2 x2 t2 P2.... At that point, the gathering director includes into the gathering client list, which will be utilized as a part of the traceability stage. After the enlistment, client i gets a private key, which will be utilized for gathering mark era and record decode. 2.3 User Revocation Client denial is performed by the gathering supervisor by means of an open accessible renouncement list (R,L) focused around which aggregate parts can scramble their information records and guarantee the privacy against the disavowed clients. At the end of the day, the others can check the freshness of the disavowal rundown from the contained current date trl. Likewise, the denial rundown is limited by a mark sig(r,l) to pronounce its legitimacy

6 2.4 File Generation Getting the revocation list from the cloud. In this step, the member sends the group identity IDgroup as a request to the cloud. Then, the cloud responds the revocation list RL to the member. TABLE 2 Message Format for Uploading Data Group ID Data ID CiperText Hash Time signature PERFORMANCE EVALUATION IDgroup IDdata C1,C2,C F(t) Tdata Sigma 2.5 File Deletion File stored in the cloud can be deleted by either the group manager or the data owner (i.e., the member who uploaded the file into the server). Algorithm (1). Signature Generation Input: Private key (A,x), system parameter (P,U,V,H,W) and data M. Output: Generate a valid group signature on M. End end for Return Invalid if e(t2-ai, H0)=temp Return Valid end if In this section, we first analyze the storage cost of Mona, and then perform experiments to test its computation cost. Storage Without loss of all inclusive statement, we set q= 160 and the components in G1 and G2 to be 161 and 1,024 bit, individually. Likewise, we expect the extent of the information personality is 16 bits, which yield a gathering limit of 2 power 16 data records. So also, the span of client and gathering character are likewise situated as 16 bits. Algorithm (2). Signature Verification Input: System parameter (P,U,V,H,W), M and a signature Sigma= (T1,T2,T3,C,Ssigma,Sbeta,Sx,S1,S2) Output: True or False. Algorithm (3). Revocation Verification Input: System parameter (H0,H1,H2), a group signature Sigma, and a set of revocation keys A1, A2,,Ar Output: Valid or Invalid. begin Set temp = e(t1,h1),e(t2,h2). for i = 1 to n Fig. 2. Comparison on computation cost for file generation between Mona and ODBE [14]. Simulation The simulation consists of three components: client side, manager side as well as cloud side. Both clientside and manager-side processes are conducted on a laptop with Core 2 T GHz, DDR G, Ubuntu X

7 Client Computation Cost In Fig. 2, we list the comparison on computation cost of clients for data generation operations between Mona and the way that directly using the original dynamic broadcast encryption (ODBE) [14]. attained through an open denial rundown without overhauling the private keys of the remaining clients, and new clients can specifically unscramble records put away in the cloud before their investment. In addition, the capacity overhead and the encryption calculation expense are steady. Broad examinations demonstrate that our proposed plan fulfills the fancied security necessities and sureties productivity also. Fig. 3. Comparison on computation cost for file access between Monab and ODBE [14]. Cloud Computation Cost To assess the execution of the cloud in Mona, we test its processing expense to react different customer operation solicitations including document era, record get to, and document cancellation. Accepting the sizes of asked for records are 100 and 10 MB, the test outcomes are given in Table 3. It can be seen that the processing expense of the cloud is regarded worthy, actually when the quantity of disavowed clients is extensive. This is on the grounds that the cloud just includes bunch mark and disavowal checks to guarantee the legitimacy of the requestor for all operations. CONCLUSION In this paper, we design a secured data sharing scheme, Mona, for Dynamic assembles in an untrusted cloud. In Mona, a client has the capacity offer information with others in the gathering without uncovering personality security to the cloud. Furthermore, Mona helps productive client repudiation and new client joining. All the more extraordinarily, productive client disavowal can be REFFERENCES: [1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp , Apr [2] S. Kamara and K. Lauter, Cryptographic Cloud Storage, Proc. Int l Conf. Financial Cryptography and Data Security (FC), pp , Jan [3] S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, Proc. IEEE INFOCOM, pp , [4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, Plutus: Scalable Secure File Sharing on Untrusted Storage, Proc. USENIX Conf. File and Storage Technologies, pp , [5] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, Sirius: Securing Remote Untrusted Storage, Proc. Network and Distributed Systems Security Symp. (NDSS), pp , [6] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, Proc. Network and Distributed Systems Security Symp. (NDSS), pp ,

8 [7] R. Lu, X. Lin, X. Liang, and X. Shen, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, Proc. ACM Symp. Information, Computer and Comm. Security, pp , [8] B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Proc. Int l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, Proc. ACM Conf. Computer and Comm. Security (CCS), pp , [10] D. Naor, M. Naor, and J.B. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, Proc. Ann. Int l Cryptology Conf. Advances in Cryptology (CRYPTO), pp , [11] D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. Int l Cryptology Conf. Advances in Cryptology (CRYPTO), pp , [12] D. Boneh, X. Boyen, and H. Shacham, Short Group Signature, Proc. Int l Cryptology Conf. Advances in Cryptology (CRYPTO), pp , [13] D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Proc. Ann. Int l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp , [14] C. Delerablee, P. Paillier, and D. Pointcheval, Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Proc. First Int l Conf. Pairing- Based Cryptography, pp , [15] D. Chaum and E. van Heyst, Group Signatures, Proc. Int l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp , [16] A. Fiat and M. Naor, Broadcast Encryption, Proc. Int l Cryptology Conf. Advances in Cryptology (CRYPTO), pp , [17] B. Wang, B. Li, and H. Li, Knox: Privacy- Preserving Auditing for Shared Data with Large Groups in the Cloud, Proc. 10th Int l Conf. Applied Cryptography and Network Security, pp , [18] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp , [19] B. Sheng and Q. Li, Verifiable Privacy- Preserving Range Query in Two-Tiered Sensor Networks, Proc. IEEE INFOCOM, pp , [20] D. Boneh, B. Lynn, and H. Shacham, Short Signature from the Weil Pairing, Proc. Int l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp ,

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code

Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

A Simple Secure Auditing for Cloud Storage

A Simple Secure Auditing for Cloud Storage A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key

More information

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,

More information

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy

More information

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud Jyoti Pingat 1, Swati Mandwade 2, 1Student, Savy Software Pvt.Ltd,Pune 2 Student,,Savy Software Pvt.Ltd,Pune Email: jyotipingat123@gmail.com

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

Military Secured Network Data Transmission

Military Secured Network Data Transmission Military Secured Network Data Transmission Shubham Jain 1, Umesh Dusane 2, Smita Lokhande 3, Vinod Kadam 4, Asst. Prof. Neha Jamdar 5 1University of Pune, Sinhgad Institute of Technology and Science, jains7272@gmail.com

More information

Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Secured Public Auditing for Shared Data in the Cloud

Secured Public Auditing for Shared Data in the Cloud International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 8, August 2015, PP 10-15 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Secured

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. I (Jul - Aug 2017), PP 91-97 www.iosrjournals.org Hierarchical Attribute Based Revocable Data

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8 Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm KandiKattu Balaji Swamy 1, K.KISHORE RAJU 2 1 M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India. 2 ASSISTANT

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User

More information

Time-Based Proxy Re-encryption Review

Time-Based Proxy Re-encryption Review Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING

SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING N. RAMESH 1, D. ANIL M.E 2, M. KIRAN 3 1, M.TECH Scholar, VEC, Kavali 2, Assistant Professor, VEC, Kavali 3, Assistant Professor,

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805 KEY AGGREGATE SEARCHABLE ENCRYPTION FOR SHARING THE DATA ON MULTI CLOUD R. U. Patil *1 & Prof. A. J. Kadam 2 M.E, Department of Computer Engineering, All India Shri Shivaji Memorial Society's, College

More information

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi

More information

A Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication

A Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication A Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication Chandriga.C M.Tech Student, Department of Computer Science and Engineering, VEMU Institute of Technology, Pakala,

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage 1

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant

More information

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K. Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code

Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User

Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar

More information

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,

More information

Identity Based Encryption and Data Self Destruction in Cloud Computing

Identity Based Encryption and Data Self Destruction in Cloud Computing Identity Based Encryption and Data Self Destruction in Cloud Computing Madhavi S. Langute M.E (Computer) Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Savitribai Phule

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

CLOUD computing, with the characteristics of intrinsic

CLOUD computing, with the characteristics of intrinsic 40 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 1, JANUARY 2016 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Zhongma Zhu and Rui Jiang Abstract Benefited

More information

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Volume 2, Issue 3, ISSN [O]: 2455-4545 Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE) Available online at: http://www.macawpublications.com Dynamic Secure

More information

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer

More information

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted 1 A.Raghavendra

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 SECURE MOBILE HEALTH CARE SYSTEM THROUGH SHARABLE AND TRACEABLE FEATURES

More information

FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE

FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE Bhuvaneswari Thangaraj 1, S.Umarani 2, D.Sharmila 3 1 PG scholar, Maharaja Engineering College, Avinashi, India 2 Assistant

More information

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE

Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Bhuvaneswari Thangaraj PG scholar, Maharaja Engineering College, Avinashi, India, S. Umarani Assistant Professor, Maharaja

More information

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION

SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION 1 K.Uma, 2 A.Mahesh. 1 Pursuing M.Tech (CSE), 2 Working as an Assistant Professor, Department of CSE, Visvesvaraya

More information

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing

A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing A Secure Cloud Storage System for Supporting Privacy-Preserving Public Auditing Yenduva Venkata Mukesh Naidu M.Tech Student Deparment of CSE, Chaitanya Engineering College, Kommadi, Madhurawada, Visakhapatnam.

More information

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

Available online at   ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

Short-term Linkable Group Signatures with Categorized Batch Verification

Short-term Linkable Group Signatures with Categorized Batch Verification Short-term Linkable Group Signatures with Categorized Batch Verification Lukas Malina 1, Jordi Castella-Rocà 2, Arnau Vives-Guasch 2, Jan Hajny 1 1 Department of Telecommunications Faculty of Electrical

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Vanita Gadekar 1, Baisa Gunjal. 2 1 Student, Computer Department, Amruthvahini College Of Engineering, Maharashtra,

More information

[Raut*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Raut*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE Swapnil D. Raut*, Prof. Avinash P. Wadhe,

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism

Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,

More information

Group User Revocation in Cloud for Shared Data

Group User Revocation in Cloud for Shared Data Group User Revocation in Cloud for Shared Data Mahesh Salunke, Harshal Meher, Ajay Tambe, Sudir Deshmukh,Prof.Sanjay Agarwal Abstract With the excessive use of internet cloud has received much of the attention.

More information

Role-Based Cryptography

Role-Based Cryptography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

Secure Data Sharing in Cloud Computing: Challenges and Research Directions

Secure Data Sharing in Cloud Computing: Challenges and Research Directions Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING

AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING Vanaparthi Hari Priya 1, A.Sanjeeva Raju 2, G.Deepak 3 1 Pursuing M.Tech (CSE), 2 Working

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11385-11390 Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate

More information

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No. A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.

More information

Enhancing Cloud Security Based On Group Signature

Enhancing Cloud Security Based On Group Signature The International Arab Journal of Information Technology, Vol. 14, No. 6, November 2017 923 Enhancing Cloud Security Based On Group Signature Arumugam Sakthivel Department of Computer Science and Engineering,

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing

Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing K.Moulika, S. Neelima, Dr.Ch.N.Santhosh Kumar 1 M-Tech, Dept. of CS, SwarnaBharthi Institute Of Science and Technology

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

Cloud Data Security using Identity Based Encryption with Outsourced Revocation

Cloud Data Security using Identity Based Encryption with Outsourced Revocation Cloud Data Security using Identity Based Encryption with Outsourced Revocation J.RAMESH RAJU 1 *, S.VENUGOPAL 2 * 1 M.Tech Student, Dept of CSE, 2 Asst.Prof, Dept of CSE. QIS COLLEGE OF ENGINEERING & TECHNOLOGY,

More information

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA Mrs.B.Jeeva, M.E., (CSE), Jay Shriram Group of Institutions, Tirupur. jeeva2mail@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala

More information

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,

More information

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Muzammil Ahmed 1, Asrarullah Khan 2 1M.E Dept. of CSE, Matoshri Pratishthan Group of Institutions, Khupsarwadi, Nanded, Maharashtra

More information

A Public Auditing Framework for Cloud Storage Security

A Public Auditing Framework for Cloud Storage Security A Public Auditing Framework for Cloud Storage Security S. Satish Kumar A.Sudheer Kumar D.Venkatesh M.Tech Student (CSE) Assistant Professor Dean of CSE & IT GATES Institute of Tech, Gooty GATES Institute

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks RESEARCH ARTICLE OPEN ACCESS NYMBLE: Blocking Misbehaving Users in Anonymizing Networks 1 R.Ravikumar, 2 J.Ramesh Kumar 1 Asst.professor, Dept.of.Computer Science, Tamil University, Thanjavur-613010. 2

More information

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University

More information