SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290
2899
Multi Owner Data Sharing & Outsourced
Revocation Using Identity Based Encryption on
Cloud
K.Kowsalya1
Department of Computer Science & Engineering
Kalasalingam Institute of Technology
Krishnan Koil, India
Email: Kowsalya30992@gmail.com
V. Ramesh2
Assistant Professor, Department of Computer Science & Engineering
Kalasalingam Institute of Technology
Krishnan Koil, India
Email: prof.rameshv@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Cloud computing is an economical and effective solution for sharing group resource among cloud users.
Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted
cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a
secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un
trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes
occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the
remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces
outsourcing computation.
Keywords: Cloud Computing; Revocation; Multi owner data sharing; Identity based encryption
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of submission: March 24, 2016 Date of Acceptance: April 28, 2016
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing is a general term used to describe a
new class of network based computing that takes place
over the Internet and it is encapsulating the delivery of
computing resources as a service.It is an efficient
solution for sharing group resources among cloud users.
The goal of cloud computing is to apply traditional
Supercomputing, or high-performance computing
power, normally used by military and research
facilities, to perform tens of trillions of computations
per second, in consumer-oriented applications such as
financial portfolios, to deliver personalized information,
to provide data storage or to power large, immersive
computer games.Identity based encryption is a public-
key encryption in which the public key of a user is
some unique information about the identity of the user
(e.g. a user's email address).secure multi-owner data
sharing scheme is implies that any user in the group can
securely share data with others in the untrusted cloud.
identity privacy is one of the most significant obstacles
for the wide deployment of cloud computing. Without
the guarantee of identity privacy, users may be
unwilling to join in cloud computing systems because
their real identities could be easily disclosed to cloud
providers and attackers. On the other hand,
unconditional identity privacy may incur the abuse of
privacy.
2. RELATED WORKS
E. Goh, H. Shacham, N. Modadugu, and D. Boneh
[5] the use of SiRiUS is compelling in situations where
users have no control over the file server (such as
Yahoo! Briefcase or the P2P file storage provided by
Farsite). They believe that SiRiUS is the most that can
be done to secure an existing network file system
without changing the file server or file system protocol.
Key management and revocation is simple with
minimal out-of-band communication. File system
freshness guarantees are supported by SiRiUS using
hash tree constructions. SiRiUS contains a novel
method of performing file random access in a
cryptographic file system without the use of a block
server. Extensions to SiRiUS include large scale group
sharing using the NNL key revocation construction.
V. Goyal, O. Pandey, A. Sahai, and B. Waters [7]
they develop a new cryptosystem for One-grained
sharing of encrypted data that call Key-Policy
Attribute-BasedEncryption (KP-ABE). In cryptosystem,
cipher texts are labelled with sets of attributes and
private keys are associated with access structures that
control which cipher texts a user is able to decrypt.They
demonstrate the applicability of our construction to
sharing of audit-log information and broadcast
encryption. Our construction supports delegation of
private keys which subsumes Hierarchical Identity-
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290
2900
Based Encryption (HIBE). The data owner uses a
random key to encrypt a file, where the random key is
further encrypted with a set of attributes using KP-
ABE. Then, the group manager assigns an access
structure and the corresponding secret key to authorized
users, such that a user can only decrypt a ciphertext if
and only if the data file attributes satisfy the access
structure. To achieve user revocation, the manager
delegates tasks of data file reencryption and user secret
key update to cloud servers. However, the single owner
manner may hinder the implementation of applications
with the scenario, where any member in a group should
be allowed to store and share data files with others.
S. Kamara and K. Lauter [8] in this paper consider
the problem of building a secure cloud storage service
on top of a public cloud infrastructure where the service
provider is not completely trusted by the customer.
They describe, at a high level,several architectures that
combine recent and non-standard cryptographic
primitives in order to achieve our goal.Survey the
benefits such architecture would provide to both
customers and service providers and give an overview
of recent advances in cryptography motivated
specifically by cloud storage.
A. Fiat and M. Naor [4] they introduce new theoretical
measures for the qualitative and quantitative assessment
of encryption schemes designed for broadcast
transmissions. The goal is to allow a central broadcast
site to broadcast secure transmissions to an arbitrary set
of recipients while minimizing key management related
transmissions. They present several schemes that allow
centers to broadcast a secret to any subset of privileged
users out of a universe of size so that coalitions of users
not in the privileged set cannot learn the secret
3. THEORETICAL ANALYSIS
3.1 PROJECT SCOPE
The scope of the project is to provide multi owner data
sharing and revocation method. Multi owner data
sharing scheme is mainly used for sharing purpose and
revocation is mainly used to provide security purpose.
3.2 PROBLEM STATEMENT
In existing system only single owner group is
present.The single owner manner hinders the adoption
of their scheme into the case where any user is granted
to store and share data.The complexities of user
participation and revocation in these schemes are
linearly increasing with the number of data owners and
the number of revoked users, respectively. Security is
very bad. User revocation is very difficult.
3.3 PROPOSED SYSTEM
The goal of this project is to provide multi owner data
sharing scheme and provide high level security.
3.3.1 Multi Owner Data Sharing Scheme
A secure multi-owner data sharing scheme is implies
that any user in the group can securely share data with
others by the untrusted cloud. Our proposed scheme is
able to support dynamic groups efficiently. Specifically,
new granted users can directly decrypt data files
uploaded before their participation without contacting
with data owners. User revocation can be easily
achieved through a novel revocation list without
updating the secret keys of the remaining users. The
size and computation overhead of encryption are
constant and independent with the number of revoked
users. A secure and privacy-preserving access control to
users, which guarantees any member in a group to
anonymously utilize the cloud resource, is provided.
Moreover, the real identities of data owners can be
revealed by the group manager when disputes occur. A
rigorous security analysis, and perform extensive
simulations to demonstrate the efficiency of our scheme
in terms of storage and computation overhead.
3.3.2 AES algorithm
AES algorithm is used for security purpose.The
following steps are done.
Step 1:Derive the set of round keys from the cipher key.
Step 2:Initialize the state array with the block data
(plaintext).
Step 3:Add the initial round key to the starting state
array.
Step 4:Perform nine rounds of state manipulation.
Step 5:Perform the tenth and final round of state
manipulation.
Step 6:Copy the final state array out as the encrypted
data (ciphertext).
The process of executing a program or application with
the intent of finding software bugs.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290
2901
4. SIMULATION SYSTEM DESIGN
4.1 Architectural Diagram
Fig 4.1:Architectural Diagram
Architecture design representation multi owner data
sharing scheme.First user have to register their
details.All group members are under the control of
group manager and all group manager are under the
control of administrator. Group member can have to
upload and download the files from cloud server.If any
user in the group should be malicious than revocate that
user from the group.Group manager distribute the key
to the group members for download purpose.Group
members can be authendicated by google app engine.
5. RESULTS
It Provide multi owner date sharing scheme and
revocation techniques. It overcome the problem of
single owner data sharing and provide high level
security
5.1 Screen shots
Software testing is an investigation conducted to
provide stakeholders with information about the quality
of theproduct or service under test. Software testing
also provides an objective, independent view of the
software to allow the business to appreciate and
understand the risks of software implementation. Test
techniques include, but are not limited to, the .
5.1.1 User Registration
Fig 5.1.1.User Requirement Selection
The first process is to any one from the list.If new user
came then the user has to do registration process.If they
want to new group then select Create a New
GroupName Here option.To view the Revocation
details from the User Revocation Details option
5.1.2 New User Registration
Fig 5.1.2 User Registration
Here the user have to register their details for
their registration process. Give their user name,
password, email-id and select the group name which
group belongs to.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290
2902
5.1.3 Group Name Registration
Fig 5.1.3 Group Name Registration
Here the group manager create the Group
Name and Group Key for the newely created group.
5.1.4 File Upload
Fig 5.1.4 File Upload
Here the user want to upload the file, choose
the file which are going to be upload,from the particular
place and then click the submit option. Then the file
will be upload successfully.
5.1.5 File Deletion
Fig 5.1.5 File Deletion
Here the user want to delete the file, select the file
which are going to be delete and then click the delete
option.
5.1.6 User Signout
Fig 5.1.6 User Signout
Atlast the user have to Sign Out from the Group or to
give request to other file group or to download other
group file.
6. CONCLUSION
To design a secure data sharing scheme for dynamic
groups in an untrusted cloud. In this a user is able to
share data with others in the group without revealing
identity privacy to the cloud. Additionally, it supports
efficient user revocation and new user joining. More
specially, efficient user revocation can be achieved
through a public revocation list without updating the
private keys of the remaining users, and new users can
directly decrypt files stored in the cloud before their
participation. Moreover, the storage overhead and the
encryption computation cost are constant. Extensive
analyses show that our proposed scheme satisfies the
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290
2903
desired security requirements and guarantees efficiency
as well.
FUTURE WORK
The enhancement of this project will be how
to avoid some type of re-computation introduced by
dynamic groups while still preserving identity privacy
from the public verifier during the process of public
data on shared data.
REFERENCES
[1] Alexandra Boldyreva, Vipul Goyal, and
Virendra Kumar” Identity-based Encryption with
Efficient Revocation” CCS 2008, ACM Press, 2008.
[2] Armbrust M, Fox A, Griffith R, Joseph A.D,
Katz R.H, Konwinski A, Lee G, Patterson D.A,
Rabkin A, Stoica I, and Zaharia M, “A View of Cloud
Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58,
Apr. 2010.
[3] Craig Gentry “Certificate-Based Encryption
and the Certificate Revocation Problem” DoCoMo USA
Labs.
[4] Fiat A and Naor M, “Broadcast Encryption,”
Proc. Int’l Cryptology Conf. Advances in Cryptology
(CRYPTO), pp. 480-491, 1993.
[5] Goh E, Shacham H, Modadugu N, and
Boneh D, “Sirius: Securing Remote Untrusted Storage,”
Proc. Network and Distributed Systems Security Symp.
(NDSS), pp. 131-145, 2003.
[6] E. Goh, H. Shacham, N. Modadugu, and D.
Boneh, “Sirius: Securing Remote Untrusted Storage,”
Proc. Network and Distributed Systems Security Symp.
(NDSS), pp. 131-145, 2003.
[7] Goyal V.Pandey O, Sahai A, and Waters B,
“Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data, “Proc. ACM Conf.
Computer and Comm. Security (CCS), pp.89-98, 2006.
[8] Kamara S and Lauter K, “Cryptographic
Cloud Storage,” Proc. Int’l Conf. Financial
Cryptography and Data Security (FC), pp. 136-149, Jan.
2010.

More Related Content

What's hot

Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptKrushna Panda
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupsSuchithra Balan
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
 
Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...eSAT Journals
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 

What's hot (18)

Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
J018145862
J018145862J018145862
J018145862
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Paper2
Paper2Paper2
Paper2
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 

Viewers also liked

An Introduction of E-learning based on Social Networks
An Introduction of E-learning based on Social NetworksAn Introduction of E-learning based on Social Networks
An Introduction of E-learning based on Social NetworksEswar Publications
 
Resolution Independent 2D Cartoon Video Conversion
Resolution Independent 2D Cartoon Video ConversionResolution Independent 2D Cartoon Video Conversion
Resolution Independent 2D Cartoon Video ConversionEswar Publications
 
Improved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksImproved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksEswar Publications
 
Content Based Image Retrieval Based on Color: A Survey
Content Based Image Retrieval Based on Color: A SurveyContent Based Image Retrieval Based on Color: A Survey
Content Based Image Retrieval Based on Color: A SurveyEswar Publications
 
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud Computing
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud ComputingPerformance Comparision of Dynamic Load Balancing Algorithm in Cloud Computing
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud ComputingEswar Publications
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...Eswar Publications
 
Decision Tree Based Algorithm for Intrusion Detection
Decision Tree Based Algorithm for Intrusion DetectionDecision Tree Based Algorithm for Intrusion Detection
Decision Tree Based Algorithm for Intrusion DetectionEswar Publications
 
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using CryptographyEswar Publications
 
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...Eswar Publications
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
 

Viewers also liked (18)

An Introduction of E-learning based on Social Networks
An Introduction of E-learning based on Social NetworksAn Introduction of E-learning based on Social Networks
An Introduction of E-learning based on Social Networks
 
Client Brochure
Client BrochureClient Brochure
Client Brochure
 
La wed 2
La wed 2La wed 2
La wed 2
 
Candidate-Pack copy
Candidate-Pack copyCandidate-Pack copy
Candidate-Pack copy
 
01
0101
01
 
Resolution Independent 2D Cartoon Video Conversion
Resolution Independent 2D Cartoon Video ConversionResolution Independent 2D Cartoon Video Conversion
Resolution Independent 2D Cartoon Video Conversion
 
Improved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksImproved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM Networks
 
M2. Tarea 7
M2. Tarea 7M2. Tarea 7
M2. Tarea 7
 
Content Based Image Retrieval Based on Color: A Survey
Content Based Image Retrieval Based on Color: A SurveyContent Based Image Retrieval Based on Color: A Survey
Content Based Image Retrieval Based on Color: A Survey
 
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud Computing
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud ComputingPerformance Comparision of Dynamic Load Balancing Algorithm in Cloud Computing
Performance Comparision of Dynamic Load Balancing Algorithm in Cloud Computing
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...
 
La wed 2
La wed 2 La wed 2
La wed 2
 
Decision Tree Based Algorithm for Intrusion Detection
Decision Tree Based Algorithm for Intrusion DetectionDecision Tree Based Algorithm for Intrusion Detection
Decision Tree Based Algorithm for Intrusion Detection
 
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...
Evaluation of Factors Influencing Internet Banking Acceptance by Internet Use...
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...
 

Similar to Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud

Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 

Similar to Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud (20)

Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290 2899 Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud K.Kowsalya1 Department of Computer Science & Engineering Kalasalingam Institute of Technology Krishnan Koil, India Email: Kowsalya30992@gmail.com V. Ramesh2 Assistant Professor, Department of Computer Science & Engineering Kalasalingam Institute of Technology Krishnan Koil, India Email: prof.rameshv@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation. Keywords: Cloud Computing; Revocation; Multi owner data sharing; Identity based encryption -------------------------------------------------------------------------------------------------------------------------------------------------- Date of submission: March 24, 2016 Date of Acceptance: April 28, 2016 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet and it is encapsulating the delivery of computing resources as a service.It is an efficient solution for sharing group resources among cloud users. The goal of cloud computing is to apply traditional Supercomputing, or high-performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games.Identity based encryption is a public- key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address).secure multi-owner data sharing scheme is implies that any user in the group can securely share data with others in the untrusted cloud. identity privacy is one of the most significant obstacles for the wide deployment of cloud computing. Without the guarantee of identity privacy, users may be unwilling to join in cloud computing systems because their real identities could be easily disclosed to cloud providers and attackers. On the other hand, unconditional identity privacy may incur the abuse of privacy. 2. RELATED WORKS E. Goh, H. Shacham, N. Modadugu, and D. Boneh [5] the use of SiRiUS is compelling in situations where users have no control over the file server (such as Yahoo! Briefcase or the P2P file storage provided by Farsite). They believe that SiRiUS is the most that can be done to secure an existing network file system without changing the file server or file system protocol. Key management and revocation is simple with minimal out-of-band communication. File system freshness guarantees are supported by SiRiUS using hash tree constructions. SiRiUS contains a novel method of performing file random access in a cryptographic file system without the use of a block server. Extensions to SiRiUS include large scale group sharing using the NNL key revocation construction. V. Goyal, O. Pandey, A. Sahai, and B. Waters [7] they develop a new cryptosystem for One-grained sharing of encrypted data that call Key-Policy Attribute-BasedEncryption (KP-ABE). In cryptosystem, cipher texts are labelled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt.They demonstrate the applicability of our construction to sharing of audit-log information and broadcast encryption. Our construction supports delegation of private keys which subsumes Hierarchical Identity-
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290 2900 Based Encryption (HIBE). The data owner uses a random key to encrypt a file, where the random key is further encrypted with a set of attributes using KP- ABE. Then, the group manager assigns an access structure and the corresponding secret key to authorized users, such that a user can only decrypt a ciphertext if and only if the data file attributes satisfy the access structure. To achieve user revocation, the manager delegates tasks of data file reencryption and user secret key update to cloud servers. However, the single owner manner may hinder the implementation of applications with the scenario, where any member in a group should be allowed to store and share data files with others. S. Kamara and K. Lauter [8] in this paper consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. They describe, at a high level,several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal.Survey the benefits such architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage. A. Fiat and M. Naor [4] they introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions. The goal is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients while minimizing key management related transmissions. They present several schemes that allow centers to broadcast a secret to any subset of privileged users out of a universe of size so that coalitions of users not in the privileged set cannot learn the secret 3. THEORETICAL ANALYSIS 3.1 PROJECT SCOPE The scope of the project is to provide multi owner data sharing and revocation method. Multi owner data sharing scheme is mainly used for sharing purpose and revocation is mainly used to provide security purpose. 3.2 PROBLEM STATEMENT In existing system only single owner group is present.The single owner manner hinders the adoption of their scheme into the case where any user is granted to store and share data.The complexities of user participation and revocation in these schemes are linearly increasing with the number of data owners and the number of revoked users, respectively. Security is very bad. User revocation is very difficult. 3.3 PROPOSED SYSTEM The goal of this project is to provide multi owner data sharing scheme and provide high level security. 3.3.1 Multi Owner Data Sharing Scheme A secure multi-owner data sharing scheme is implies that any user in the group can securely share data with others by the untrusted cloud. Our proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. User revocation can be easily achieved through a novel revocation list without updating the secret keys of the remaining users. The size and computation overhead of encryption are constant and independent with the number of revoked users. A secure and privacy-preserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource, is provided. Moreover, the real identities of data owners can be revealed by the group manager when disputes occur. A rigorous security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead. 3.3.2 AES algorithm AES algorithm is used for security purpose.The following steps are done. Step 1:Derive the set of round keys from the cipher key. Step 2:Initialize the state array with the block data (plaintext). Step 3:Add the initial round key to the starting state array. Step 4:Perform nine rounds of state manipulation. Step 5:Perform the tenth and final round of state manipulation. Step 6:Copy the final state array out as the encrypted data (ciphertext). The process of executing a program or application with the intent of finding software bugs.
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290 2901 4. SIMULATION SYSTEM DESIGN 4.1 Architectural Diagram Fig 4.1:Architectural Diagram Architecture design representation multi owner data sharing scheme.First user have to register their details.All group members are under the control of group manager and all group manager are under the control of administrator. Group member can have to upload and download the files from cloud server.If any user in the group should be malicious than revocate that user from the group.Group manager distribute the key to the group members for download purpose.Group members can be authendicated by google app engine. 5. RESULTS It Provide multi owner date sharing scheme and revocation techniques. It overcome the problem of single owner data sharing and provide high level security 5.1 Screen shots Software testing is an investigation conducted to provide stakeholders with information about the quality of theproduct or service under test. Software testing also provides an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Test techniques include, but are not limited to, the . 5.1.1 User Registration Fig 5.1.1.User Requirement Selection The first process is to any one from the list.If new user came then the user has to do registration process.If they want to new group then select Create a New GroupName Here option.To view the Revocation details from the User Revocation Details option 5.1.2 New User Registration Fig 5.1.2 User Registration Here the user have to register their details for their registration process. Give their user name, password, email-id and select the group name which group belongs to.
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290 2902 5.1.3 Group Name Registration Fig 5.1.3 Group Name Registration Here the group manager create the Group Name and Group Key for the newely created group. 5.1.4 File Upload Fig 5.1.4 File Upload Here the user want to upload the file, choose the file which are going to be upload,from the particular place and then click the submit option. Then the file will be upload successfully. 5.1.5 File Deletion Fig 5.1.5 File Deletion Here the user want to delete the file, select the file which are going to be delete and then click the delete option. 5.1.6 User Signout Fig 5.1.6 User Signout Atlast the user have to Sign Out from the Group or to give request to other file group or to download other group file. 6. CONCLUSION To design a secure data sharing scheme for dynamic groups in an untrusted cloud. In this a user is able to share data with others in the group without revealing identity privacy to the cloud. Additionally, it supports efficient user revocation and new user joining. More specially, efficient user revocation can be achieved through a public revocation list without updating the private keys of the remaining users, and new users can directly decrypt files stored in the cloud before their participation. Moreover, the storage overhead and the encryption computation cost are constant. Extensive analyses show that our proposed scheme satisfies the
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 05 Pages: 2899-2903 (2016) ISSN: 0975-0290 2903 desired security requirements and guarantees efficiency as well. FUTURE WORK The enhancement of this project will be how to avoid some type of re-computation introduced by dynamic groups while still preserving identity privacy from the public verifier during the process of public data on shared data. REFERENCES [1] Alexandra Boldyreva, Vipul Goyal, and Virendra Kumar” Identity-based Encryption with Efficient Revocation” CCS 2008, ACM Press, 2008. [2] Armbrust M, Fox A, Griffith R, Joseph A.D, Katz R.H, Konwinski A, Lee G, Patterson D.A, Rabkin A, Stoica I, and Zaharia M, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010. [3] Craig Gentry “Certificate-Based Encryption and the Certificate Revocation Problem” DoCoMo USA Labs. [4] Fiat A and Naor M, “Broadcast Encryption,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993. [5] Goh E, Shacham H, Modadugu N, and Boneh D, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003. [6] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003. [7] Goyal V.Pandey O, Sahai A, and Waters B, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, “Proc. ACM Conf. Computer and Comm. Security (CCS), pp.89-98, 2006. [8] Kamara S and Lauter K, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.