SlideShare a Scribd company logo
1 of 27
Presented by:
C.SUCHITHRA
Department of Computer Science
Dr. Pauls Engineering College
Guided by:
Mr. G. APPASAMI M.Tech.,
(Ph.D.,)
Assistant Professor (CSE),
Dr. Pauls Engineering College
ABSTRACT
INTRODUCTION
EXISTING SYSTEM
PROPOSED SYSTEM
SYSTEM MODEL
DESIGN GOALS
SIMULATION RESULTS
CONCLUSION
 Due to the frequent change of the membership, sharing data in a
multi-owner manner is a major problem in cloud computing.
 Identity privacy and Privacy preserving from an untrusted cloud
is still a challenging issue.
 By Leveraging Group Signature and Dynamic Broadcast
encryption techniques, any cloud user can anonymously share
data with others.
 The main aim is to secure data sharing in dynamic groups, there is
no fixed attributes whereas multi-owner attributes is possible.
 Meanwhile, the storage overhead and encryption computation cost
of the scheme are independent with the number of revoked users.
 It also analyze the security of scheme with rigorous proof and
demonstrate the efficiency in experiment.
 It consists of H/w & S/w resources
made available on the internet as
managed third-party services.
 These service typically provide access
to advanced s/w application & high-
end network of server computers.
 An Internet connection
 An account - Created with a user name and a password
 Agree to Terms
 Can be less expensive compared to
buying software and hardware.
 Can be used from any computer or
device with an Internet
connection.
 The device does not need as large
of an internal storage system.
Anywhere
at any
time
Sharing
Work
wherever
you are
Collaboration
 The most fundamental services offered by cloud providers is
data storage.
 With cloud computing and storage, users are able to access and
to share resources offered by cloud service providers at a lower
marginal cost.
 Cloud-based service providers are globally connected to each
other and offer a seamless service to their customers.
 In the existing system data owners store the encrypted data files in
untrusted storage and distribute the corresponding decryption keys
only to authorized users.
 The complexities of user participation and revocation in these
schemes are linearly increasing with the number of data owners and
the number of revoked users.
 The changes of membership make secure data sharing extremely
difficult and the issue of user revocation is not addressed.
 Identity privacy is one of the most significant obstacles for the
wide deployment of cloud computing.
 Without the guarantee of identity privacy, users may be
unwilling to join in cloud computing systems.
 Because their real identities could be easily disclosed to cloud
providers and attackers.
 On the other hand, unconditional identity privacy may incur
the abuse of privacy.
 Attribute based encryption technique new granted users can
directly decrypt data files and uploaded before their participation
without contacting with data owners.
 User revocation can be easily achieved through a novel
revocation list without updating the secret keys of the remaining
users.
 The size and computation overhead of encryption are constant
and independent with the number of revoked users.
 Its provide secure and privacy-preserving access control to users.
 Moreover, the real identities of data owners can be revealed by
the group manager when disputes occur.
 Compared with the Single-owner, Multiple-owner is more
flexible in practical applications.
 Each user in the group is able to not only read data , but also
modify his/her part of data in the entire data file shared by the
company.
 Any user in the group can store and share data files with others
by the cloud.
 The encryption complexity and size of cipher texts are
independent with the number of revoked users in the system.
 User revocation can be achieved without updating the private
keys of the remaining users.
GROUP SIGNATURE
 Allows any member of the group to sign messages while keeping
the identity secret from verifiers.
 Besides, the designated group manager can reveal the identity of
the signature’s originator when a dispute occurs.
 Used to achieve anonymous access control.
DYNAMIC BROADCAST ENCRYPTION
 To transmit encrypted data to a set of users so that only a
privileged subset of users can decrypt the data.
 It also allows the group manager to dynamically include new
members while preserving previously computed information.
The system model consists of five different entities
• The cloud Server,
• Group Manager (i.e., the company manager)
• Group Members (i.e., the staffs)
• Key distribution
• Revocation
 Access control
 Data confidentiality
 Anonymity and Traceability
 Efficiency
Comparison on computation cost for file
generation between Innovative and ODBE
Comparison on computation cost for file
access between Innovative and ODBE.
 This work designs a secure data sharing scheme, for
dynamic clusters in an untrusted cloud.
 A user is able to share data with others in the group without
revealing identity privacy to the cloud.
 Additionally, it supports efficient user revocation and new
user joining.
 Moreover, the storage overhead and the encryption
computation cost are constant.
 Extensive analyses show that this proposed scheme satisfies
the desired security requirements and guarantees efficiency
as well
T
QUERIES ???

More Related Content

What's hot

Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]Raj Kumar
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...JAYAPRAKASH JPINFOTECH
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Papitha Velumani
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Pvrtechnologies Nellore
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...ieeepondy
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Nexgen Technology
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Papitha Velumani
 

What's hot (18)

Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 

Viewers also liked

A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudNinad Samel
 
Taller 3 powert point sebastian david lópez gonzalez
Taller 3 powert point sebastian david lópez gonzalezTaller 3 powert point sebastian david lópez gonzalez
Taller 3 powert point sebastian david lópez gonzalezSebastian Lopez
 
Present delegate-state
Present delegate-statePresent delegate-state
Present delegate-statementallog
 
Que son lectores rss
Que son lectores rssQue son lectores rss
Que son lectores rssMilton Moreno
 
Tableau Admin Profile
Tableau Admin ProfileTableau Admin Profile
Tableau Admin ProfileWasim Mirza
 
Citizenship award stage 2
Citizenship award stage 2Citizenship award stage 2
Citizenship award stage 2Caleb Tan
 
Codes and Conventions of Social Realism Films
Codes and Conventions of Social Realism FilmsCodes and Conventions of Social Realism Films
Codes and Conventions of Social Realism FilmsRichardMichaelJones
 
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...City of Vancouver
 
MANAGEMENT 3.0 - change and innovation practices
MANAGEMENT 3.0 - change and innovation practicesMANAGEMENT 3.0 - change and innovation practices
MANAGEMENT 3.0 - change and innovation practicesRatekoulutus
 
Suspension and Chassis_Glossary
Suspension and Chassis_GlossarySuspension and Chassis_Glossary
Suspension and Chassis_GlossaryWilliam Harbin
 
Relational Database and mysql insight
Relational Database and mysql insightRelational Database and mysql insight
Relational Database and mysql insightmentallog
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudShakas Technologies
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webappVineeth E
 

Viewers also liked (18)

A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Taller 3 powert point sebastian david lópez gonzalez
Taller 3 powert point sebastian david lópez gonzalezTaller 3 powert point sebastian david lópez gonzalez
Taller 3 powert point sebastian david lópez gonzalez
 
Present delegate-state
Present delegate-statePresent delegate-state
Present delegate-state
 
Que son lectores rss
Que son lectores rssQue son lectores rss
Que son lectores rss
 
Tableau Admin Profile
Tableau Admin ProfileTableau Admin Profile
Tableau Admin Profile
 
Citizenship award stage 2
Citizenship award stage 2Citizenship award stage 2
Citizenship award stage 2
 
Words to peace
Words to peaceWords to peace
Words to peace
 
India against spam
India against spamIndia against spam
India against spam
 
Codes and Conventions of Social Realism Films
Codes and Conventions of Social Realism FilmsCodes and Conventions of Social Realism Films
Codes and Conventions of Social Realism Films
 
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...
Mayor Gregor Robertson - Presentation on Inclusive Economic Development in Va...
 
Game engine
Game engineGame engine
Game engine
 
Anatomia, Histologia y Fisiologia Pancreatica
Anatomia, Histologia y Fisiologia PancreaticaAnatomia, Histologia y Fisiologia Pancreatica
Anatomia, Histologia y Fisiologia Pancreatica
 
MANAGEMENT 3.0 - change and innovation practices
MANAGEMENT 3.0 - change and innovation practicesMANAGEMENT 3.0 - change and innovation practices
MANAGEMENT 3.0 - change and innovation practices
 
Suspension and Chassis_Glossary
Suspension and Chassis_GlossarySuspension and Chassis_Glossary
Suspension and Chassis_Glossary
 
Relational Database and mysql insight
Relational Database and mysql insightRelational Database and mysql insight
Relational Database and mysql insight
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Srs example webapp
Srs example webappSrs example webapp
Srs example webapp
 

Similar to secure multi-owner data sharing for dynamic groups

Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Encryption based multi user manner
Encryption based multi user mannerEncryption based multi user manner
Encryption based multi user mannerprj_publication
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 

Similar to secure multi-owner data sharing for dynamic groups (20)

Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Encryption based multi user manner
Encryption based multi user mannerEncryption based multi user manner
Encryption based multi user manner
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

secure multi-owner data sharing for dynamic groups

  • 1. Presented by: C.SUCHITHRA Department of Computer Science Dr. Pauls Engineering College Guided by: Mr. G. APPASAMI M.Tech., (Ph.D.,) Assistant Professor (CSE), Dr. Pauls Engineering College
  • 2. ABSTRACT INTRODUCTION EXISTING SYSTEM PROPOSED SYSTEM SYSTEM MODEL DESIGN GOALS SIMULATION RESULTS CONCLUSION
  • 3.  Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing.  Identity privacy and Privacy preserving from an untrusted cloud is still a challenging issue.  By Leveraging Group Signature and Dynamic Broadcast encryption techniques, any cloud user can anonymously share data with others.
  • 4.  The main aim is to secure data sharing in dynamic groups, there is no fixed attributes whereas multi-owner attributes is possible.  Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users.  It also analyze the security of scheme with rigorous proof and demonstrate the efficiency in experiment.
  • 5.  It consists of H/w & S/w resources made available on the internet as managed third-party services.  These service typically provide access to advanced s/w application & high- end network of server computers.
  • 6.  An Internet connection  An account - Created with a user name and a password  Agree to Terms
  • 7.  Can be less expensive compared to buying software and hardware.  Can be used from any computer or device with an Internet connection.  The device does not need as large of an internal storage system. Anywhere at any time Sharing Work wherever you are Collaboration
  • 8.  The most fundamental services offered by cloud providers is data storage.  With cloud computing and storage, users are able to access and to share resources offered by cloud service providers at a lower marginal cost.  Cloud-based service providers are globally connected to each other and offer a seamless service to their customers.
  • 9.  In the existing system data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users.  The complexities of user participation and revocation in these schemes are linearly increasing with the number of data owners and the number of revoked users.  The changes of membership make secure data sharing extremely difficult and the issue of user revocation is not addressed.
  • 10.  Identity privacy is one of the most significant obstacles for the wide deployment of cloud computing.  Without the guarantee of identity privacy, users may be unwilling to join in cloud computing systems.  Because their real identities could be easily disclosed to cloud providers and attackers.  On the other hand, unconditional identity privacy may incur the abuse of privacy.
  • 11.  Attribute based encryption technique new granted users can directly decrypt data files and uploaded before their participation without contacting with data owners.  User revocation can be easily achieved through a novel revocation list without updating the secret keys of the remaining users.  The size and computation overhead of encryption are constant and independent with the number of revoked users.  Its provide secure and privacy-preserving access control to users.
  • 12.  Moreover, the real identities of data owners can be revealed by the group manager when disputes occur.  Compared with the Single-owner, Multiple-owner is more flexible in practical applications.  Each user in the group is able to not only read data , but also modify his/her part of data in the entire data file shared by the company.
  • 13.  Any user in the group can store and share data files with others by the cloud.  The encryption complexity and size of cipher texts are independent with the number of revoked users in the system.  User revocation can be achieved without updating the private keys of the remaining users.
  • 14. GROUP SIGNATURE  Allows any member of the group to sign messages while keeping the identity secret from verifiers.  Besides, the designated group manager can reveal the identity of the signature’s originator when a dispute occurs.  Used to achieve anonymous access control.
  • 15. DYNAMIC BROADCAST ENCRYPTION  To transmit encrypted data to a set of users so that only a privileged subset of users can decrypt the data.  It also allows the group manager to dynamically include new members while preserving previously computed information.
  • 16.
  • 17. The system model consists of five different entities • The cloud Server, • Group Manager (i.e., the company manager) • Group Members (i.e., the staffs) • Key distribution • Revocation
  • 18.  Access control  Data confidentiality  Anonymity and Traceability  Efficiency
  • 19. Comparison on computation cost for file generation between Innovative and ODBE
  • 20. Comparison on computation cost for file access between Innovative and ODBE.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.  This work designs a secure data sharing scheme, for dynamic clusters in an untrusted cloud.  A user is able to share data with others in the group without revealing identity privacy to the cloud.  Additionally, it supports efficient user revocation and new user joining.  Moreover, the storage overhead and the encryption computation cost are constant.  Extensive analyses show that this proposed scheme satisfies the desired security requirements and guarantees efficiency as well
  • 26. T