International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud M.Nikitha1,R.Aiswarya2,N.praveena3,N.Ramakalpana4 1,2,3
Department of Computer Science and Engineering, Adithya Institute of Technology, Coimbatore, TamilNadu, India.
4 Assistant
Professor, Department of Computer Science and Engineering, Adithya Institute of Technology, Coimbatore, TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud Computing, users can achieve an growing
can be protected from collusion attack. In this paper the
and balanced methodology for data sharing among the group
main contributions of this scheme include:
members and individuals in the cloud with the characters of tiny management and tiny maintenance cost. It provides a security certification for data sharing because outsourced
1.
channel and the user can securely know their
data’s are at risk .Due to frequently changing the memberships
private key from their group manager without any
in the group provide privacy preserving issue ,mainly for an
certificate authority because of verification of public
untrusted cloud due to collusion attack or pilot attack. In
key of the user .
existing system key distribution is based on secure communication channels[1]. In that key is known to everyone
The key distribution without any communication
2.
This scheme can achieve fine grain access control,
and implementation is very difficult to practice. In this paper,
any user in the group can access their resources and
we propose a key distribution without any communication
revoked user cannot access the data in the cloud
channel and the user can know their private key from their
after they are rejected.
group manager in secured manner. AES Algorithm is used for data encryption and decryption techniques and ring signature
3.
This can protect collusion attack which means the revoked user cannot get original data from the
is used for key distribution between the group members.
cloud.
Key Words: AES Algorithm, Ring signature, pilot attack, cloud computing, privacy preserving.
4.
Our scheme can achieve secure user revocation with the help of polynomial function.
1.INTRODUCTION Cloud computing ,with characteristics of natural
5.
This scheme are able to achieve fine efficiency,
information data sharing with low maintenance and better
scheme achieve fine efficiency, that is previous
utilization of resources. In this data can be shared data in
users need not updated they are private key when
secured manner, in cloud it can be achieve secure data
new user adds or rejected from the group.
sharing in dynamic groups. Cloud computing offers an infinite storage space. In our scheme, secured data sharing Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 730