Enabling Secure Data Sharing Scheme in the Cloud Storage Groups

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 04 Issue: 07 | July -2017

p-ISSN: 2395-0072

www.irjet.net

Enabling Secure Data Sharing Scheme in the Cloud Storage Groups C.Pavani1, S.Vasundra2 1M.Tech,

CSE Department, JNTUCEA, Ananthapuramu, AP, India. CSE Department, JNTUCEA, Ananthapuramu, AP, India.

2Professor,

-----------------------------------------------------------------------------***---------------------------------------------------------------------------distribution in secure way such that group manager provides private keys to the users. The scheme can offer an abstraction of infinite storage space for clients to achieve fine-grained access control. It provides the host the data. It helps clients to reduce economic overhead security against collusion attack by using group of data management by moving the local management signature which provides secure user revocation. system into cloud servers. However, security concern Collusion attack means decryption of data by revoked becomes the main constraint. To preserve data user using his secret key and get secrete file by conspire confidentiality, there is an approach to encrypt data files with the cloud. Secure user revocation means the before the client upload the encrypted data into the cloud revoked users cannot get the original data file even if which is challenging task in active groups in the cloud. they conspire with the untrusted cloud. The scheme can This paper proposes an Identity based ring signature for achieve fine efficiency, which means previous users need data sharing in the cloud storage groups. This system aims not to update their private keys when either a new user at offering forward security to massive amount of data joins in the group or a user is revoked from the group. sharing in the cloud. It also provides the authenticity and Secure and efficient methods are needed to ensure anonymity of the end users. The method can achieve integrity and privacy of data stored at the cloud [2]. secure key distribution, fine-grained access control, anticollusion attack and secure user revocation. Group signature [3] allows members of a specified group to sign message on behalf of the entire group that is Keywords: Access control, privacy-preserving, key without revealing their individual identities. Group distribution, cloud computing, identity based ring signature has two properties 1) anonymity 2) signature. traceability. Anonymity means that, it does not revel which specific group members form the signature. As in 1. INTRODUCTION any privacy preserving applications, anonymity of the users is maintained as much as possible, but still need to Now-a-days the internet has to support different be sure that there is a mechanism in place for technologies. One of the mainly popular technology is misbehaving members of group to get caught. The group cloud computing. Cloud computing atmosphere provides signature identifies the misbehaving users can be easily the massive storages facility to the client. Now a days, revealed with help of traceability property. But there are cloud computing is a technology to allow the user some security applications in which it’s disagreeable for accessing the data which stored in remote server. It can a signer identity to be revealed. It is violating the be easily and quickly accessible through the internet anonymity property of group signature. To overcome which has been pay per use on demand service. Cloud this drawback, this paper proposes the Identity Based computing mainly used for business and organization Ring Signature [4]. This system aims at offering forward and provide the huge amount of space for data sharing at security to massive scale data sharing in the cloud. low cost. Clouds are provided by many cloud computing Ring signature for data sharing inside the cloud provides service providers like Amazon, Drop box, Google app secure data sharing using identity based ring signature engine etc. Cloud provides one of the most essential within the group. It additionally provides the services is data storage. authenticity and anonymity of the end users. The proposed system avoids costly certificate keys for Data sharing between two members or group of verification as in the conventional public key members take several issues into account. They are infrastructure setting which is a bottleneck. In Identity efficiency, data integrity and privacy of data owner. based ring signature, Leakage of secret key of any user Providing the privacy and the integrity are the most doesn’t make all preceding generated signatures invalid. challenging tasks for dynamic groups. The assets is especially important to any huge amount of data sharing system, as it is impossible to ask all data The existing system provides a secure data sharing owners to re-authenticate their data even if a secret key scheme for dynamic members [1]. Without using Secure of one single user has been revealed. Communication channels, this method uses key

Abstract--In cloud computing, cloud service providers

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

| Page 2491


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.