SlideShare a Scribd company logo
1 of 20
DEPARTMENT OF COMPUTER ENGINEERING
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY,
BAVDHAN,PUNE-411021
AY-2015-2016
A Seminar
On
“Secure Data Sharing For Dynamic Groups in Multi-Owner Using Cloud”
By
Mr. Sagar A. Dhanake
Under guidance of
Prof.V.S.Nandedkar
CONTENTS
.
1. Cloud Computing
2. Introduction
3. Motivation
4. Literature Survey
5. Problem Definition
6. System Architecture
7. System Models
8. Modules
9. Algorithms
10.Applications
11. Advantages
12. Conclusion
13. Future Scope
14. References
Cloud Computing???
.
Cloud computing is the access to computers and their functionality
via the Internet or a local area network. Users of a cloud request this
access from a set of web services that manage a pool of computing
resources.
The user cannot actually see or specify the physical location and
organization of the equipment hosting the resources they are
ultimately allowed to use. That is, the resources are drawn from a
“cloud” of resources when they are granted to a user and returned to
the cloud when they are released.
A “cloud” is a set of machines and web services that implement
cloud computing.
INTRODUCTION
.
Cloud computing is providing the identity privacy as one of its
obstacles without this user may not show interest to use the cloud
systems. Here unconditional identity is giving a chance to privacy
Problems.
The data owners store the encrypted data files in untrusted storage
and distribute the corresponding decryption keys only to authorized
users.
It also maintains the revocation list that gives the information
about the current group members. Changes of membership make
secure data sharing highly difficult. Key management is also become
difficult for every change of membership in the list.
To solve the above challenging issues here introduced the MONA,
Multi-owner data sharing-any one of the group member can securely
share and store the data with others by the untrusted cloud.
INTRODUCTION (Conti…)
Dynamic group management-This scheme is able to support
dynamic groups efficiently. Specifically, new granted users can
directly decrypt data files uploaded before their participation
without contacting with data owners.
Secure sharing and privacy preserving access control to users
is providing. So that when ever dispute occurs data owners real
identities will be revealed by group manager.
Also provide secure and privacy-preserving access control to
users, which guarantees any member in a group to anonymously
utilize the cloud resource.
It can provide strict security analysis, and perform extensive
simulations to demonstrate the efficiency of our scheme in terms
of storage and computation overhead.
MOTIVATION
Cloud computing is providing the basic characteristics such as
low maintenance and resource sharing.
In multiple-owner any one of the group member can share,
store or modify the data. So that all the members can enjoy the
storing and sharing of data across the cloud.
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
User revocation is performed by the group manager via a
public available revocation list (RL).
To transmit encrypted data to a set of users so that only a
privileged subset of users can decrypt the data.
LITERATURE SURVEY
SrNo Title Journal Description
1. A Dynamic
Secure Group Sharing
Framework in Public
Cloud Computing
IEEE Transactions on Cloud
Computing, vol. 2, No. 4,
Oct-Dec 2014
In this paper proposed a
dynamic secure group sharing
framework in public cloud
computing environment.
2. Mona: Secure Multi-
Owner Data Sharing
for Dynamic Groups in
the Cloud
IEEE Transactions on
Parallel and Distributed
Systems Vol. 24, NO. 6,
June 2013
In this paper design a secure
data sharing scheme, Mona, for
dynamic groups in an untrusted
cloud.
3 A Cloud Security
Framework for Data
Sharing in Dynamic
Gruoups
IJESR/October 2014/ Vol-
4/Issue-10/652-658.
In this paper design a secure
data sharing scheme, a user is
able to share data with others in
the group without revealing
identity privacy to the cloud.
4 Mona: Secure Multi-
Owner Data
Sharing for Dynamic
Groups in the Cloud
IJERA, January 2015 In this paper user is able to
share data with others in the
group without revealing
identity privacy to the cloud
and supports efficient user
revocation and new user
joining.
PROBLEM DEFINITION
Problem Statement
Secure multi-owner data sharing scheme, it implies that any user
in the group can securely share data with others by the untrusted
cloud. Support dynamic groups efficiently. Specifically, new
granted users can directly decrypt data files uploaded before
their participation without contacting with data owners.
SYSTEM ARCHITECTURE
SYSTEM MODELS
The system model consists of five different entities:-
Cloud Server
Group Manager
Group Member
Key Distribution
Revocation
MODULES
Registration
Login
Group Signature
File Upload
File Download
User Deletion
ALGORITHMS
1. Signature Generation
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
Besides, the designated group manager can reveal the identity of
the signature’s originator when a dispute occurs, which is
denoted as traceability.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:-
1. Let us consider private key (A,x) and system parameters as (P,U,V,H,W) where data is
referred as M.
2. Select random numbers , , r ,r, rx,ry,r1,r2 zq*.
3. Set 1=x and 2=x .
4. Now compute the following values as,
5. The first encryption set of values are as follows set C=f(M,T1,T2,T3,R1,R2,R3,R4,R5)
6. Now, consider another set of random numbers for further encryption process as
(C,C,Cx,C1,C2).
7. After the complete encryption process the result is =(T1,T2,T3,C,S,S,Sx,S1,S2).
ALGORITHMS Continue…
2. Signature Verification
Here user have to verify the group signature key and file key’s
with the triple DES decryption process.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:
1. Here the input parameters are (H0,H1,H2) and the group signature
=(T1,T2,T3,C,S,S,S2) and a set of revocation keys A1,....,Ar.
2. Here they set the temp file with the following set temp=e(T1,H1)e(T2,H2).
3. for i =1 to n
if e(T3-Ai,H0)=temp
4. Here if, it can get the two values are equal it returns a valid message and otherwise it
returns invalid message.
ALGORITHMS Continue…
3. Revocation Verification
User revocation is performed by the group manager via a
public available revocation list (RL), based on which group
members can encrypt their data files and ensure the confidentiality
against the revoked users.
Input: System parameter (P,U,V,H,W), M and a signature
Ϭ = (T1,T2,T3,c,sα,sβ,sx,sβ1,sβ2)
Output: True or False.
Steps:
1. Here the input is the encrypted form of the data which was generated in the Signature
generation process. The input parameters are System parameters(P,U,V,H,W),M and the
signature =(T1,T2,T3,C,S,S,Sx,S1,S 2).
2. Here they compute the following values.
3. After completing the generation of variables. I have to calculate the following function
f(M,T1,T2,T3,R1',R2',R3',R4',R5').
4. Here if the generated function is equals to the c (first encrypted result in encryption
process) then it returns the result as true otherwise it will show the result as false.
APPLICATIONS
 Data Confidentiality
 Access Control
 Anonymity and Traceability
 Efficiency
 Dynamic broadcast encryption is used.
 Authentication is done by Group signatures.
 Supports effective user repudiation and new user registration.
 Revocation can be attained without updating the private keys of
other users.
ADVANTAGES
Any user in the group can store and share data files with others by
the cloud.
The encryption complexity and size of cipher texts are
independent with the number of revoked users in the system.
User revocation can be achieved without updating the private keys
of the remaining users.
It provide the services as a low maintenance cost and high quality
services.
Save the investments data.
Maintain the data as a sensitive data without accessing any
unauthorized users.
CONCLUSION
This work designs a secure data sharing scheme, for dynamic
clusters in an untrusted cloud. A user is able to share data with
others in the group without revealing identity privacy to the cloud.
Additionally, it supports efficient user revocation and new user
joining. Moreover, the storage overhead and the encryption
computation cost are constant. Extensive analyses show that this
proposed scheme satisfies the desired security requirements and
guarantees efficiency as well.
FUTURE SCOPE
In future for solving the reliability and scalability issues we further
introduce the back-up group manager. In case of any failures of
group manager the back up group manager handles those problems.
So that the reliability and scalability increases.
REFERNCES
[1] Xuefeng Liu, Yuqing Zhang, BoyangWang, and Jingbo Yan "Mona: Secure Multi-
Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS VOL.
24, NO. 6, JUNE 2013.
[2] Kaiping Xue, Member, IEEE and Peilin Hong, Member, IEEE, A Dynamic Secure
Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud
Computing, vol. 2, No. 4, Oct-Dec 2014.
[3] K. Janardhan, M. Narendra "Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud", International Journal of Engineering Research and Applications
(IJERA), Jan.2015.
[4] Ameena Mehar , M.S.V.V. Ramesh, D.D.D.Suribabu “A CLOUD SECURITY
FRAMEWORK FOR DATA SHARING IN DYNAMIC GROUPS”, IJESR/October
2014/ Vol-4/Issue-10/652-658.
[5] M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the
Cloud ,IJARCET , Volume 2, Issue 6, June 2013.
[6] Hitesh S, P Ramesh Naidu "CLOUD SECURITY FRAMEWORK FOR MULTI-
OWNER DATA AUTHENTICATION", International Journal of Research In Science and
Engineering, Volume: 1 Special Issue: 2.
Thank You!!!!

More Related Content

What's hot

Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemAlchemist095
 
Data Mining : Concepts
Data Mining : ConceptsData Mining : Concepts
Data Mining : ConceptsPragya Pandey
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
IoT in Oil and Gas Industry
IoT in Oil and Gas IndustryIoT in Oil and Gas Industry
IoT in Oil and Gas IndustryAnkit Rai
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notesMohit Saini
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Big Data Characteristics And Process PowerPoint Presentation Slides
Big Data Characteristics And Process PowerPoint Presentation SlidesBig Data Characteristics And Process PowerPoint Presentation Slides
Big Data Characteristics And Process PowerPoint Presentation SlidesSlideTeam
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for HealthcareCitiusTech
 
18CS81 IOT MODULE 4 PPT.pdf
18CS81 IOT MODULE 4 PPT.pdf18CS81 IOT MODULE 4 PPT.pdf
18CS81 IOT MODULE 4 PPT.pdfFURYGaming22
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 

What's hot (20)

Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
 
Data Mining
Data MiningData Mining
Data Mining
 
Multimedia Information Retrieval
Multimedia Information RetrievalMultimedia Information Retrieval
Multimedia Information Retrieval
 
Data Mining : Concepts
Data Mining : ConceptsData Mining : Concepts
Data Mining : Concepts
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
IoT in Oil and Gas Industry
IoT in Oil and Gas IndustryIoT in Oil and Gas Industry
IoT in Oil and Gas Industry
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
5 v of big data
5 v of big data5 v of big data
5 v of big data
 
Big Data Characteristics And Process PowerPoint Presentation Slides
Big Data Characteristics And Process PowerPoint Presentation SlidesBig Data Characteristics And Process PowerPoint Presentation Slides
Big Data Characteristics And Process PowerPoint Presentation Slides
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for Healthcare
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
18CS81 IOT MODULE 4 PPT.pdf
18CS81 IOT MODULE 4 PPT.pdf18CS81 IOT MODULE 4 PPT.pdf
18CS81 IOT MODULE 4 PPT.pdf
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 

Viewers also liked

A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptKrushna Panda
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudNinad Samel
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesLeila_maleke
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
 
FOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEEFOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEETalvinder Singh
 
Solar Air Conditioner
Solar Air ConditionerSolar Air Conditioner
Solar Air Conditionerskullcrusher
 

Viewers also liked (8)

A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
FOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEEFOREST FIRE DETECTION SYSTEM USING XBEE
FOREST FIRE DETECTION SYSTEM USING XBEE
 
Solar Air Conditioner
Solar Air ConditionerSolar Air Conditioner
Solar Air Conditioner
 
Air conditioning system
Air conditioning systemAir conditioning system
Air conditioning system
 

Similar to Secure data sharing for dynamic groups in multi-owner using cloud

SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...IEEEFINALYEARSTUDENTPROJECT
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupsSuchithra Balan
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud IJERA Editor
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 

Similar to Secure data sharing for dynamic groups in multi-owner using cloud (20)

SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Secure data sharing for dynamic groups in multi-owner using cloud

  • 1. DEPARTMENT OF COMPUTER ENGINEERING PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY, BAVDHAN,PUNE-411021 AY-2015-2016 A Seminar On “Secure Data Sharing For Dynamic Groups in Multi-Owner Using Cloud” By Mr. Sagar A. Dhanake Under guidance of Prof.V.S.Nandedkar
  • 2. CONTENTS . 1. Cloud Computing 2. Introduction 3. Motivation 4. Literature Survey 5. Problem Definition 6. System Architecture 7. System Models 8. Modules 9. Algorithms 10.Applications 11. Advantages 12. Conclusion 13. Future Scope 14. References
  • 3. Cloud Computing??? . Cloud computing is the access to computers and their functionality via the Internet or a local area network. Users of a cloud request this access from a set of web services that manage a pool of computing resources. The user cannot actually see or specify the physical location and organization of the equipment hosting the resources they are ultimately allowed to use. That is, the resources are drawn from a “cloud” of resources when they are granted to a user and returned to the cloud when they are released. A “cloud” is a set of machines and web services that implement cloud computing.
  • 4. INTRODUCTION . Cloud computing is providing the identity privacy as one of its obstacles without this user may not show interest to use the cloud systems. Here unconditional identity is giving a chance to privacy Problems. The data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users. It also maintains the revocation list that gives the information about the current group members. Changes of membership make secure data sharing highly difficult. Key management is also become difficult for every change of membership in the list. To solve the above challenging issues here introduced the MONA, Multi-owner data sharing-any one of the group member can securely share and store the data with others by the untrusted cloud.
  • 5. INTRODUCTION (Conti…) Dynamic group management-This scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. Secure sharing and privacy preserving access control to users is providing. So that when ever dispute occurs data owners real identities will be revealed by group manager. Also provide secure and privacy-preserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource. It can provide strict security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead.
  • 6. MOTIVATION Cloud computing is providing the basic characteristics such as low maintenance and resource sharing. In multiple-owner any one of the group member can share, store or modify the data. So that all the members can enjoy the storing and sharing of data across the cloud. A group signature scheme allows any member of the group to sign messages while keeping the identity secret from verifiers. User revocation is performed by the group manager via a public available revocation list (RL). To transmit encrypted data to a set of users so that only a privileged subset of users can decrypt the data.
  • 7. LITERATURE SURVEY SrNo Title Journal Description 1. A Dynamic Secure Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud Computing, vol. 2, No. 4, Oct-Dec 2014 In this paper proposed a dynamic secure group sharing framework in public cloud computing environment. 2. Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud IEEE Transactions on Parallel and Distributed Systems Vol. 24, NO. 6, June 2013 In this paper design a secure data sharing scheme, Mona, for dynamic groups in an untrusted cloud. 3 A Cloud Security Framework for Data Sharing in Dynamic Gruoups IJESR/October 2014/ Vol- 4/Issue-10/652-658. In this paper design a secure data sharing scheme, a user is able to share data with others in the group without revealing identity privacy to the cloud. 4 Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud IJERA, January 2015 In this paper user is able to share data with others in the group without revealing identity privacy to the cloud and supports efficient user revocation and new user joining.
  • 8. PROBLEM DEFINITION Problem Statement Secure multi-owner data sharing scheme, it implies that any user in the group can securely share data with others by the untrusted cloud. Support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners.
  • 10. SYSTEM MODELS The system model consists of five different entities:- Cloud Server Group Manager Group Member Key Distribution Revocation
  • 12. ALGORITHMS 1. Signature Generation A group signature scheme allows any member of the group to sign messages while keeping the identity secret from verifiers. Besides, the designated group manager can reveal the identity of the signature’s originator when a dispute occurs, which is denoted as traceability. Input: Private key (A,x), system parameter (P,U,V,H,W) and data M. Output: Generate a valid group signature on M. Steps:- 1. Let us consider private key (A,x) and system parameters as (P,U,V,H,W) where data is referred as M. 2. Select random numbers , , r ,r, rx,ry,r1,r2 zq*. 3. Set 1=x and 2=x . 4. Now compute the following values as, 5. The first encryption set of values are as follows set C=f(M,T1,T2,T3,R1,R2,R3,R4,R5) 6. Now, consider another set of random numbers for further encryption process as (C,C,Cx,C1,C2). 7. After the complete encryption process the result is =(T1,T2,T3,C,S,S,Sx,S1,S2).
  • 13. ALGORITHMS Continue… 2. Signature Verification Here user have to verify the group signature key and file key’s with the triple DES decryption process. Input: Private key (A,x), system parameter (P,U,V,H,W) and data M. Output: Generate a valid group signature on M. Steps: 1. Here the input parameters are (H0,H1,H2) and the group signature =(T1,T2,T3,C,S,S,S2) and a set of revocation keys A1,....,Ar. 2. Here they set the temp file with the following set temp=e(T1,H1)e(T2,H2). 3. for i =1 to n if e(T3-Ai,H0)=temp 4. Here if, it can get the two values are equal it returns a valid message and otherwise it returns invalid message.
  • 14. ALGORITHMS Continue… 3. Revocation Verification User revocation is performed by the group manager via a public available revocation list (RL), based on which group members can encrypt their data files and ensure the confidentiality against the revoked users. Input: System parameter (P,U,V,H,W), M and a signature Ϭ = (T1,T2,T3,c,sα,sβ,sx,sβ1,sβ2) Output: True or False. Steps: 1. Here the input is the encrypted form of the data which was generated in the Signature generation process. The input parameters are System parameters(P,U,V,H,W),M and the signature =(T1,T2,T3,C,S,S,Sx,S1,S 2). 2. Here they compute the following values. 3. After completing the generation of variables. I have to calculate the following function f(M,T1,T2,T3,R1',R2',R3',R4',R5'). 4. Here if the generated function is equals to the c (first encrypted result in encryption process) then it returns the result as true otherwise it will show the result as false.
  • 15. APPLICATIONS  Data Confidentiality  Access Control  Anonymity and Traceability  Efficiency  Dynamic broadcast encryption is used.  Authentication is done by Group signatures.  Supports effective user repudiation and new user registration.  Revocation can be attained without updating the private keys of other users.
  • 16. ADVANTAGES Any user in the group can store and share data files with others by the cloud. The encryption complexity and size of cipher texts are independent with the number of revoked users in the system. User revocation can be achieved without updating the private keys of the remaining users. It provide the services as a low maintenance cost and high quality services. Save the investments data. Maintain the data as a sensitive data without accessing any unauthorized users.
  • 17. CONCLUSION This work designs a secure data sharing scheme, for dynamic clusters in an untrusted cloud. A user is able to share data with others in the group without revealing identity privacy to the cloud. Additionally, it supports efficient user revocation and new user joining. Moreover, the storage overhead and the encryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements and guarantees efficiency as well.
  • 18. FUTURE SCOPE In future for solving the reliability and scalability issues we further introduce the back-up group manager. In case of any failures of group manager the back up group manager handles those problems. So that the reliability and scalability increases.
  • 19. REFERNCES [1] Xuefeng Liu, Yuqing Zhang, BoyangWang, and Jingbo Yan "Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS VOL. 24, NO. 6, JUNE 2013. [2] Kaiping Xue, Member, IEEE and Peilin Hong, Member, IEEE, A Dynamic Secure Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud Computing, vol. 2, No. 4, Oct-Dec 2014. [3] K. Janardhan, M. Narendra "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud", International Journal of Engineering Research and Applications (IJERA), Jan.2015. [4] Ameena Mehar , M.S.V.V. Ramesh, D.D.D.Suribabu “A CLOUD SECURITY FRAMEWORK FOR DATA SHARING IN DYNAMIC GROUPS”, IJESR/October 2014/ Vol-4/Issue-10/652-658. [5] M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the Cloud ,IJARCET , Volume 2, Issue 6, June 2013. [6] Hitesh S, P Ramesh Naidu "CLOUD SECURITY FRAMEWORK FOR MULTI- OWNER DATA AUTHENTICATION", International Journal of Research In Science and Engineering, Volume: 1 Special Issue: 2.