Secure Sharing of Data for Dynamic Group in Cloud Storage Application
-
Published:2021-04-20
Issue:
Volume:
Page:563-569
-
ISSN:2456-3307
-
Container-title:International Journal of Scientific Research in Computer Science, Engineering and Information Technology
-
language:en
-
Short-container-title:IJSRCSEIT
Author:
Cheelu Dr. Dhanaraj1, Maheswari K. V. Uma2
Affiliation:
1. Professor, Department of CSE, Dr. K. V. Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India 2. M.Tech, Department of CSE, Dr. K. V. Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India
Abstract
Data sharing is increasingly important for many users and sometimes an essential requirement, especially for industries and society’s used to gain proceeds. Sharing group resource among cloud users is a major problem, still the data privacy leak. The existing system Group Key Management method used for sharing Key Generation and distribution in the group member or users. Sometimes change to user one group to another group, the group key to enable authenticated users to access the files securely and efficiently is still a challenging problem. This problem to avoid that sharing data in group using the Time Based Group Key Management (TGKM) techniques for cryptographic cloud storage application , which Conditional Identity Based Broadcast Proxy Re-Encryption (CIBPRE) used to transforming the data’s(files) major process in cloud server. To Key Generation method for user a time based dynamic group Key which capably to make stronger in cloud security. Generally, security and performance evaluated that the proposed scheme is highly efficient and satisfies the security requirements for cloud based application.
Publisher
Technoscience Academy
Reference18 articles.
1. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable and fine-grained data accesscontrol in cloud computing. In: Proceedings of IEEE INFOCOM 2010, pp. 15–19 (2010). 2. Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: NDSS 2003 (2003). 3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS 2005 (2005) 4. Bethencourt, J., Sahai, A., Waters, B.: CiphertextPolicy Attribute-Based Encryption. In: 28th IEEE Symposium on Security and Privacy 2007, pp. 321–334 (2007) 5. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., 2010 Workshops. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010).
|
|