SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1694
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Ankita Ajay Jadhav1, Poonam Doshi(Lambhate) 2, Mohan V. Pawar3
1Department of Computer Engineering, JSCOE, Pune, Maharashtra, India, Email Id: ankitajadhav029@gmail.com
2Second PhD Scholar, Pascific University Udiapur. Email Id: pinu_poonam@yahoo.co.in
3 JSCOE, Hadpsar, Pune, Maharashtra,India Email Id: mohanpawar2006@gmail.com
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data sharing among cluster memberswithin the
cloud with the characters of low maintenance and tiny
management price. Meanwhile, we tend to offer security
guarantees for the sharing information files since they're
outsourced. To owing the frequent amendment of the
membership, sharing information whereas providingprivacy-
preserving continues to be a difficult issue, particularly for an
untrusted cloud owing to the collusion attack. Moreover, for
existing schemes, the safety of key distributionispredicatedon
the secure channel, however, to own such channel may be a
sturdy assumption and is troublesome for apply. We tend to
propose a secure information sharing theme for dynamic
members. First, we tend to propose a secure manner for key
distribution with none secure communication channels, and
therefore the users will firmly obtain their non-public keys
from cluster manager. Secondly, wecandofine-grainedaccess
management; any user within the group of members will use
the supply within the cloud and revoked users not able to
access the cloud once more once they'rerevoked. Third, we are
able to shield the theme from collusion attack, which suggests
that revoked users cannot get the initial record though they
conspire with the untrusted cloud. In our approach, by
investing polynomial perform; we are able to attain a secure
user revocation theme. Finally, we can provide the non-public
key for security where the user needn’t update, hence no need
for a replacement of user joins within the cluster or a user is
revoked from the cluster.
Key Words: Anti Collusion, Privacy Preserving,
Revocation, Key Distribution, Data Confidentiality,
Access Control
1.INTRODUCTION
In Cloud Computing by consolidating an
arrangement of existing and new procedures from
research regions, for example, Service-Oriented
Architectures (SOA) and virtualization, distributed
computing is viewed all things considered a figuring
worldviewinwhichassetsintheprocessingfoundation
are given as administrations overtheInternet.Onetest
in this setting is to accomplish fine grain, information
privacy, and adaptability all the while, which is not
given by current work. In this paper,weproposeaplan
to accomplish this objective by misusing KPABE and
remarkably joining it with procedures of intermediary
re-encryptionandapatheticre-encryption.Besides,our
proposed plan can empower the information
proprietor to designate the majority of calculation
overhead to capable cloud servers. Classification of
client get to benefit and client mystery key
responsibility can be accomplished. A standout
amongst principal administration offered by cloud
suppliers isinformationstockpiling.Giveusachanceto
consider handy information.
We can give secure and protection saving
access control to clients, which will give certainity of
any part in a gathering to secretly use the cloud asset.
Also, thegenuinecharactersofinformationproprietors
can be uncovered by the gatheringchiefwhenquestion
happen. In distributed computing, cloud servers give
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1695
an endless storage room to clients to storeinformation
[1]. It can help customers diminish theirmoneyrelated
yield of information administrations by outsourcing
the neighborhood stockpiling into the cloud. Be that as
it may, as we now transfer informationtothecloud,we
lose the physical controloftheinformationstockpiling.
Toaccomplishsecurityprotecting,atypicalapproachis
to utilize cryptographyinformation records beforethe
customers outsource the delicate information to the
cloud [2]. Sadly, the ordinarywayisinsufficientinview
of our itemized objectives, for example, fine-grained
get to control. It is hard to plan a safe and productive
information sharing plan, particularly for element
individuals.
2. LITERATURE SURVEY
Ateniese et al. [1] proposed that quick and
secure re-encryption will turn out to be progressively
mainstream as a strategy for overseeing encoded
document frameworks. Albeit effectively processable,
the across the board reception of BBS re-encryption
has been frustrated by extensive security dangers.
Taking after late work of Dodis and Ivan, we show new
re-encryption plots that understand a more grounded
idea of security, and we exhibit the helpfulness of
intermediary re-encryption as a technique for adding
access control to a protected record framework.
Dan et al. [2] presented paper shows the
testing open issue by one hand, characterizing and
authorizing access arrangements in view of
information features, and, then again, permitting the
information proprietor to assign a large portion of the
calculation undertakings required in fine-grained
information get to control to untrusted cloud servers
without revealing the basic informationsubstance.We
accomplish this objective by abusingandexceptionally
consolidating strategies of trait-based encryption
(ABE), intermediary re-encryption, and apathetic re-
encryption. Our proposed plot likewise has striking
properties of client get to benefit classification and
client mystery key responsibility.
Liu et al. [3] In Mona, a client can impart
information to others in the gathering without
uncovering character security to the cloud. Also, Mona
underpins effective client repudiation and new client
joining. All the more uncommonly, effective client
repudiation can be accomplished through an open
renouncementlistwithoutredesigningtheprivatekeys
of the rest of the clients, and new clients can
specifically decode records put away in the cloud
before their interest.
Zhu et al. [4]presentedplancouldaddressfine-
grained get to control, which implies that not just the
gathering individuals could utilize the sharing
information asset whenever additionally the new
clients could utilize the sharing information instantly
after their disavowals and the denied clients won't be
permitted to utilize the sharing informationagainafter
they are expelled from the gathering. Nonetheless,
through our security examination, the Mona conspire
still has some security vulnerabilities.Itwilleffectively
experience the ill effects of the intrigue assault, which
can prompttotherenouncedclientsgettingthesharing
information and uncovering other honest to goodness
individuals' insider facts. Moreover, there is another
security lack in the clientenrollmentstage,whichisthe
way to ensure the private key while circulatingitinthe
unsecured correspondence channels.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1696
3. SYSTEM MODEL
3.1 EXISTING SYSTEM
A security planning for information sharing on
untrusted servers has been proposed. In these
methodologies, information owner stores the
encryptedorencodedinformationrecordsinuntrusted
big data and disseminate the relating decoding secret
key just to approved clients.
In this way, unapproved clients, and also stockpiling
servers, can't take in the substance of the information
documents since they have no learning of the
unscramblingkeys, However,thecomplexitiesofclient
support and denial in these plans are directly
expanding the quantity of information proprietorsand
the quantity disavowed clients, separately.
By setting a gathering with a solitary quality, Lu et al.
proposed a protected provenance conspire in light of
the figure content arrangement trait based encryption
strategy, which permits any individual from a
gathering to impart information to others. Be that as it
may, the issue of client renouncement is not tended to
Fig 1. System Model
They introduced a versatile and fine-grained
information get to control plot in distributed
computing in light of the key strategy property based
encryption (KP-ABE) system. Tragically, the single
proprietor way ruins the reception of their plan into
the situation where any client is allowed to store and
share information.
3.2 Proposed System
The System will keep up trustworthiness if
renounce clients can't get an entrance of shared
information once they have been disavowed.Bethatas
it may, this framework experiences a crash assault by
the deny client and a cloud. the plan can accomplish
fine effectiveness, which implies past clients require
not to redesign their private keys for the circumstance
either another client participates in the gathering or a
client is renounced from the gathering. To Achieve a
Secure Anti-Collusion Data Sharing Scheme, for
element gathers in the cloud. we propose a safe
informationsharingplanforelementindividuals.Inthe
first place, Group Manager wills distinctive deals with
alternate gatherings and give an endorsement for
Group individuals for enrollment. Client denial is
performed byagatheringmanager. GroupMemberwill
do enrollment first then transfer and download
operation will be performed by the gathering part as it
were.
in their plan
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1697
Fig 2. System Architecture Design
Hostile to plot data sharing plan for element
organizations insidethecloud,theclientscansafelyget
their private keys from group supervisor testaments
Authorities and secure correspondence channels.
Likewise, our plan is prepared to help dynamic
companies productively, whenafreshoutoftheplastic
new client joins inside the workforce or a purchaser is
denied from the gathering, the classified keys of the
inverse clients don't need to be recomputed and
redesigned. In addition, our plan can harvest calm
client disavowal; the denied clients can't be prepared
to get the standard information reports when they are
repudiated despite the fact that they scheme with the
untrusted cloud.
4. SYSTEM ANALYSIS
AES is based on a design principle known as
a substitution-permutation network, combination of
both substitution and permutation, and is fast in both
software and hardware. Unlike its predecessor DES,
AES does not use a Feistel network. AES is a variant of
Rijndael which has a fixed block size of 128 bits, and
a key size of 128, 192, or 256 bits. By contrast, the
Rijndael specification per se is specifiedwithblockand
key sizes that may be any multiple of 32 bits, both with
a minimum of 128 and a maximum of 256 bits.
AES operates on a 4 × 4 column-major order matrix of
bytes, termed the state, although some versions of
Rijndael have a larger block size and have additional
columns in the state. Most AES calculations are donein
a special finite field.
For instance, if there are 16 bytes, b0, b1, b2….b15 ,
these bytes are represented as this matrix:
The key size used for an AES cipher specifies the
number of repetitions of transformation rounds that
convert the input, called the plaintext, into the final
output, called the ciphertext. The number of cycles of
repetition is as follows:
 10 cycles of repetition for 128-bit keys.
 12 cycles of repetition for 192-bit keys.
 14 cycles of repetition for 256-bit keys.
Each round consists of several processing steps, each
containing four similar but different stages, including
one that depends on the encryption key itself. A set of
reverse rounds are applied to transform ciphertext
back into the original plaintext using the same
encryption key.
High-level description of the algorithm:
1. KeyExpansions—round keys are derived from
the cipher key using Rijndael's key schedule. AES
requires a separate 128-bit round key block for each
round plus one more.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698
2. InitialRound
1. AddRoundKey—each byte of the stateiscombined
with a block of the round key using bitwise xor.
3. Rounds
1. SubBytes—a non-linear substitution
step where each byte is replaced with
another according to a lookup table.
2. ShiftRows—atranspositionstepwhere
the last three rows of the state are
shifted cyclically a certain number of
steps.
3. MixColumns—a mixing operation
which operates on the columns of the
state, combiningthefourbytesineach
column.
4. AddRoundKey
4. Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey.
5. SECURITY ANALYSIS
In general, this scheme can achieve secure key
distribution, fine access control, and secure user
revocation. For clearly seeing the advantages of
security of ourproposedscheme,asillustratedinTable
1, we list a table compared with Mona[3], which is Liu
et al.’s scheme, the RBAC[10] scheme, which is Zhou et
al.’s scheme and ODBE[9] scheme, which is Delerablee
et al.’s scheme. The ‘Yes’intheblankmeansthescheme
can achieve the corresponding goal.
Table -1: Security Analysis Comparison
Secur
e key
Acces
s
contr
ol
Secure
user
revocati
on
confi
d
-
entia
-lity
Anti
collusi
on
attack
Mona - Yes - - -
RABC - Yes - - -
ODBE - Yes Yes Yes -
Our
schem
a
Yes Yes Yes Yes Yes
The graphical representation between two schemas.
Chart -1: Graphical comparison of (ODBE & Our
schema)
3. CONCLUSIONS
The system proposes a Secure Anti-Collusion
Data Sharing Scheme, for dynamic groups in the cloud.
By member group signature and dynamic broadcast
encryption techniques, any cloudusercanunidentified
share data with others. Meanwhile, the storage
expensesandencryptionestimationcostofourscheme
are independentwiththenumberofofficiallycancelled
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1699
users. The system mainly concentrates on the user
official cancellationwhichshouldsolvetheproblemsof
efficiency and storage. In addition, we examine the
security system of our scheme with harsh proofs and
demonstrate the efficiency of our scheme in expected
results.
ACKNOWLEDGEMENT
It is with the profound sense of gratitude I would like
to acknowledge constant help and encouragement
from our guide and Co-Guide Prof P.D. Lambhate and
Prof M.V Pawar respectively. Our Head of the
department(Computer Engineering) Prof H.A
Hingoliwala, Post Graduate Coordinator ProfMDIngle
and Principal Dr M G Jadhav JSCOE, Hadapsar for their
sterling efforts, amenable assistance and continues
guidance in all my work. They have given in depth
knowledge and enlightened me on this work.
REFERENCES
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxy re-encryption schemes with
applications to secure distributed storage,” in Proc.
Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43.
[2] B. Dan and F. Matt, “Identity-basedencryptionfrom
theweil pairing in Proc. 21st Annu. Int. Cryptol. Conf.
Adv Cryptol., 2001, vol. 2139, pp. 213–229.
[3] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona:Secure
multiowner data sharing for dynamic groups in the
cloud,” IEEE Trans.
[4] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona:
Secure multiowner datasharingfordynamicgroupsin
the cloud,” in Proc. Int. Conf. Inf. Sci. Cloud Comput.,
Dec. 7, 2013, pp. 185–189.
[5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz,
A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica,
and M. Zaharia, “A view of cloud computing,”
Commun. ACM, vol. 53, no. 4.
[6] D. Boneh, X. Boyen, and H. Shacham, “Short group
signature,” in Proc. Int. Cryptology Conf. Adv.
Cryptology, 2004, pp. 41–55.
[7] B. Waters, “Ciphertext-policy attribute-based
encryption: An expressive, efficient, and provably
secure realization,” in Proc. Int. Conf. Practice Theory
Public Key Cryptography Conf. Public Key
Cryptography, 2008, pp. 53–70.
[8] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving
secure, scalable, andfine-graineddataaccesscontrolin
cloud computing,” in Proc. ACM Symp. Inf., Comput.
Commun. Security, 2010, pp. 282–292.
[9] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully
collusion secure dynamic broadcast encryption with
constant-size Ci-phertexts or decryptionkeys,”inProc.
1st Int. Conf. Pairing-Based Cryptography, 2007, pp.
39–59(ODBE original dynamic broadcast encryption
(ODBE) scheme)
[10] L. Zhou, V. Varadharajan, and M. Hitchens,
“Achieving secure role-based access control on
encrypted data in cloud storage,” IEEE Trans. Inf.
Forensics Security, vol. 8, no. 12, pp. 1947–1960, Dec.
2013. (RBAC)
[11] X. Zou, Y.-S. Dai, and E. Bertino, “A practical and
flexible key management mechanism for trusted
collaborative computing,” in Proc. IEEE Conf. Comput.
Commun., 2008, pp. 1211–1219.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1700
[12] M. Nabeel, N. Shang, and E. Bertino, “Privacy
preserving policy based content sharing in public
clouds,” IEEE Trans. Know. Data Eng., vol. 25, no. 11,
pp. 2602–2614, Nov. 2013.
[13] D. Dolev and A. C. Yao, “On the security of public
key protocols,” IEEETrans.Inf.Theory,vol.IT-29,no.2,
pp. 198–208, Mar. 1983.
[14] B. Den Boer, “Diffie–Hellman is as strong as
discrete log for certain primes,” in Proc. Adv. Cryptol.,
1988, p. 530.
[15] D. Boneh, X. Boyen, and E. Goh, “Hierarchical
identity based encryption with constant size
ciphertext,” in Proc. Annu. Int. Conf. Theory Appl.
Cryptographic Techn., 2005, pp. 440–456.
[16] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-based encryption for fine-grained access
control of encrypted data,” in Proc. ACM Conf. Comput.
Commun. Security, 2006, pp. 89–98.
[17] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure
provenance: The essential of bread and butter of data
forensics in cloud computing,” in Proc. ACM Symp. Inf.,
Comput. Commun. Security, 2010, pp. 282–292.
[18] A. Fiat and M. Naor, “Broadcast Encryption,” Proc.
Int’l Cryptology Conf. Advances in Cryptology
(CRYPTO), pp. 480-491, 1993
[19] B. Sheng and Q. Li, “Verifiable Privacy-Preserving
Range Query in Two-Tiered Sensor Networks,” Proc.
IEEE INFOCOM, pp. 4650, 2008.
[20] D. Boneh, B. Lynn, and H. Shacham, “Short
Signature from the Weil Pairing,” Proc. Int’l Conf.
Theory and Application of Cryptology and Information
Security: Advances in Cryptology, pp. 514-532, 2001.
BIOGRAPHIES
Miss. Ankita Ajay Jadhav
Student in Department of
Computer Engineering,
Jayawantrao Sawant College of
Engineering, Pune, Mah, India.
She pursued her BE (Comp)
from Pune University, Mah,India
in 2012 and Pursuing ME
(Comp) from Jayawantrao
Sawant College of Engineering,
Pune, Mah, India. Her research
interests include Cloud
Computing Security.

More Related Content

What's hot

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET Journal
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 

What's hot (19)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 

Similar to Anti Collusion Data Sharing Schema for Centralized Group in Cloud

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET Journal
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 

Similar to Anti Collusion Data Sharing Schema for Centralized Group in Cloud (20)

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 

Anti Collusion Data Sharing Schema for Centralized Group in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1694 Anti Collusion Data Sharing Schema for Centralized Group in Cloud Ankita Ajay Jadhav1, Poonam Doshi(Lambhate) 2, Mohan V. Pawar3 1Department of Computer Engineering, JSCOE, Pune, Maharashtra, India, Email Id: ankitajadhav029@gmail.com 2Second PhD Scholar, Pascific University Udiapur. Email Id: pinu_poonam@yahoo.co.in 3 JSCOE, Hadpsar, Pune, Maharashtra,India Email Id: mohanpawar2006@gmail.com ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data sharing among cluster memberswithin the cloud with the characters of low maintenance and tiny management price. Meanwhile, we tend to offer security guarantees for the sharing information files since they're outsourced. To owing the frequent amendment of the membership, sharing information whereas providingprivacy- preserving continues to be a difficult issue, particularly for an untrusted cloud owing to the collusion attack. Moreover, for existing schemes, the safety of key distributionispredicatedon the secure channel, however, to own such channel may be a sturdy assumption and is troublesome for apply. We tend to propose a secure information sharing theme for dynamic members. First, we tend to propose a secure manner for key distribution with none secure communication channels, and therefore the users will firmly obtain their non-public keys from cluster manager. Secondly, wecandofine-grainedaccess management; any user within the group of members will use the supply within the cloud and revoked users not able to access the cloud once more once they'rerevoked. Third, we are able to shield the theme from collusion attack, which suggests that revoked users cannot get the initial record though they conspire with the untrusted cloud. In our approach, by investing polynomial perform; we are able to attain a secure user revocation theme. Finally, we can provide the non-public key for security where the user needn’t update, hence no need for a replacement of user joins within the cluster or a user is revoked from the cluster. Key Words: Anti Collusion, Privacy Preserving, Revocation, Key Distribution, Data Confidentiality, Access Control 1.INTRODUCTION In Cloud Computing by consolidating an arrangement of existing and new procedures from research regions, for example, Service-Oriented Architectures (SOA) and virtualization, distributed computing is viewed all things considered a figuring worldviewinwhichassetsintheprocessingfoundation are given as administrations overtheInternet.Onetest in this setting is to accomplish fine grain, information privacy, and adaptability all the while, which is not given by current work. In this paper,weproposeaplan to accomplish this objective by misusing KPABE and remarkably joining it with procedures of intermediary re-encryptionandapatheticre-encryption.Besides,our proposed plan can empower the information proprietor to designate the majority of calculation overhead to capable cloud servers. Classification of client get to benefit and client mystery key responsibility can be accomplished. A standout amongst principal administration offered by cloud suppliers isinformationstockpiling.Giveusachanceto consider handy information. We can give secure and protection saving access control to clients, which will give certainity of any part in a gathering to secretly use the cloud asset. Also, thegenuinecharactersofinformationproprietors can be uncovered by the gatheringchiefwhenquestion happen. In distributed computing, cloud servers give
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1695 an endless storage room to clients to storeinformation [1]. It can help customers diminish theirmoneyrelated yield of information administrations by outsourcing the neighborhood stockpiling into the cloud. Be that as it may, as we now transfer informationtothecloud,we lose the physical controloftheinformationstockpiling. Toaccomplishsecurityprotecting,atypicalapproachis to utilize cryptographyinformation records beforethe customers outsource the delicate information to the cloud [2]. Sadly, the ordinarywayisinsufficientinview of our itemized objectives, for example, fine-grained get to control. It is hard to plan a safe and productive information sharing plan, particularly for element individuals. 2. LITERATURE SURVEY Ateniese et al. [1] proposed that quick and secure re-encryption will turn out to be progressively mainstream as a strategy for overseeing encoded document frameworks. Albeit effectively processable, the across the board reception of BBS re-encryption has been frustrated by extensive security dangers. Taking after late work of Dodis and Ivan, we show new re-encryption plots that understand a more grounded idea of security, and we exhibit the helpfulness of intermediary re-encryption as a technique for adding access control to a protected record framework. Dan et al. [2] presented paper shows the testing open issue by one hand, characterizing and authorizing access arrangements in view of information features, and, then again, permitting the information proprietor to assign a large portion of the calculation undertakings required in fine-grained information get to control to untrusted cloud servers without revealing the basic informationsubstance.We accomplish this objective by abusingandexceptionally consolidating strategies of trait-based encryption (ABE), intermediary re-encryption, and apathetic re- encryption. Our proposed plot likewise has striking properties of client get to benefit classification and client mystery key responsibility. Liu et al. [3] In Mona, a client can impart information to others in the gathering without uncovering character security to the cloud. Also, Mona underpins effective client repudiation and new client joining. All the more uncommonly, effective client repudiation can be accomplished through an open renouncementlistwithoutredesigningtheprivatekeys of the rest of the clients, and new clients can specifically decode records put away in the cloud before their interest. Zhu et al. [4]presentedplancouldaddressfine- grained get to control, which implies that not just the gathering individuals could utilize the sharing information asset whenever additionally the new clients could utilize the sharing information instantly after their disavowals and the denied clients won't be permitted to utilize the sharing informationagainafter they are expelled from the gathering. Nonetheless, through our security examination, the Mona conspire still has some security vulnerabilities.Itwilleffectively experience the ill effects of the intrigue assault, which can prompttotherenouncedclientsgettingthesharing information and uncovering other honest to goodness individuals' insider facts. Moreover, there is another security lack in the clientenrollmentstage,whichisthe way to ensure the private key while circulatingitinthe unsecured correspondence channels.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1696 3. SYSTEM MODEL 3.1 EXISTING SYSTEM A security planning for information sharing on untrusted servers has been proposed. In these methodologies, information owner stores the encryptedorencodedinformationrecordsinuntrusted big data and disseminate the relating decoding secret key just to approved clients. In this way, unapproved clients, and also stockpiling servers, can't take in the substance of the information documents since they have no learning of the unscramblingkeys, However,thecomplexitiesofclient support and denial in these plans are directly expanding the quantity of information proprietorsand the quantity disavowed clients, separately. By setting a gathering with a solitary quality, Lu et al. proposed a protected provenance conspire in light of the figure content arrangement trait based encryption strategy, which permits any individual from a gathering to impart information to others. Be that as it may, the issue of client renouncement is not tended to Fig 1. System Model They introduced a versatile and fine-grained information get to control plot in distributed computing in light of the key strategy property based encryption (KP-ABE) system. Tragically, the single proprietor way ruins the reception of their plan into the situation where any client is allowed to store and share information. 3.2 Proposed System The System will keep up trustworthiness if renounce clients can't get an entrance of shared information once they have been disavowed.Bethatas it may, this framework experiences a crash assault by the deny client and a cloud. the plan can accomplish fine effectiveness, which implies past clients require not to redesign their private keys for the circumstance either another client participates in the gathering or a client is renounced from the gathering. To Achieve a Secure Anti-Collusion Data Sharing Scheme, for element gathers in the cloud. we propose a safe informationsharingplanforelementindividuals.Inthe first place, Group Manager wills distinctive deals with alternate gatherings and give an endorsement for Group individuals for enrollment. Client denial is performed byagatheringmanager. GroupMemberwill do enrollment first then transfer and download operation will be performed by the gathering part as it were. in their plan
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1697 Fig 2. System Architecture Design Hostile to plot data sharing plan for element organizations insidethecloud,theclientscansafelyget their private keys from group supervisor testaments Authorities and secure correspondence channels. Likewise, our plan is prepared to help dynamic companies productively, whenafreshoutoftheplastic new client joins inside the workforce or a purchaser is denied from the gathering, the classified keys of the inverse clients don't need to be recomputed and redesigned. In addition, our plan can harvest calm client disavowal; the denied clients can't be prepared to get the standard information reports when they are repudiated despite the fact that they scheme with the untrusted cloud. 4. SYSTEM ANALYSIS AES is based on a design principle known as a substitution-permutation network, combination of both substitution and permutation, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specifiedwithblockand key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits. AES operates on a 4 × 4 column-major order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are donein a special finite field. For instance, if there are 16 bytes, b0, b1, b2….b15 , these bytes are represented as this matrix: The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of repetition is as follows:  10 cycles of repetition for 128-bit keys.  12 cycles of repetition for 192-bit keys.  14 cycles of repetition for 256-bit keys. Each round consists of several processing steps, each containing four similar but different stages, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. High-level description of the algorithm: 1. KeyExpansions—round keys are derived from the cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1698 2. InitialRound 1. AddRoundKey—each byte of the stateiscombined with a block of the round key using bitwise xor. 3. Rounds 1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. ShiftRows—atranspositionstepwhere the last three rows of the state are shifted cyclically a certain number of steps. 3. MixColumns—a mixing operation which operates on the columns of the state, combiningthefourbytesineach column. 4. AddRoundKey 4. Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey. 5. SECURITY ANALYSIS In general, this scheme can achieve secure key distribution, fine access control, and secure user revocation. For clearly seeing the advantages of security of ourproposedscheme,asillustratedinTable 1, we list a table compared with Mona[3], which is Liu et al.’s scheme, the RBAC[10] scheme, which is Zhou et al.’s scheme and ODBE[9] scheme, which is Delerablee et al.’s scheme. The ‘Yes’intheblankmeansthescheme can achieve the corresponding goal. Table -1: Security Analysis Comparison Secur e key Acces s contr ol Secure user revocati on confi d - entia -lity Anti collusi on attack Mona - Yes - - - RABC - Yes - - - ODBE - Yes Yes Yes - Our schem a Yes Yes Yes Yes Yes The graphical representation between two schemas. Chart -1: Graphical comparison of (ODBE & Our schema) 3. CONCLUSIONS The system proposes a Secure Anti-Collusion Data Sharing Scheme, for dynamic groups in the cloud. By member group signature and dynamic broadcast encryption techniques, any cloudusercanunidentified share data with others. Meanwhile, the storage expensesandencryptionestimationcostofourscheme are independentwiththenumberofofficiallycancelled
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1699 users. The system mainly concentrates on the user official cancellationwhichshouldsolvetheproblemsof efficiency and storage. In addition, we examine the security system of our scheme with harsh proofs and demonstrate the efficiency of our scheme in expected results. ACKNOWLEDGEMENT It is with the profound sense of gratitude I would like to acknowledge constant help and encouragement from our guide and Co-Guide Prof P.D. Lambhate and Prof M.V Pawar respectively. Our Head of the department(Computer Engineering) Prof H.A Hingoliwala, Post Graduate Coordinator ProfMDIngle and Principal Dr M G Jadhav JSCOE, Hadapsar for their sterling efforts, amenable assistance and continues guidance in all my work. They have given in depth knowledge and enlightened me on this work. REFERENCES [1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43. [2] B. Dan and F. Matt, “Identity-basedencryptionfrom theweil pairing in Proc. 21st Annu. Int. Cryptol. Conf. Adv Cryptol., 2001, vol. 2139, pp. 213–229. [3] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona:Secure multiowner data sharing for dynamic groups in the cloud,” IEEE Trans. [4] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure multiowner datasharingfordynamicgroupsin the cloud,” in Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185–189. [5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4. [6] D. Boneh, X. Boyen, and H. Shacham, “Short group signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology, 2004, pp. 41–55. [7] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. Int. Conf. Practice Theory Public Key Cryptography Conf. Public Key Cryptography, 2008, pp. 53–70. [8] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, andfine-graineddataaccesscontrolin cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [9] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully collusion secure dynamic broadcast encryption with constant-size Ci-phertexts or decryptionkeys,”inProc. 1st Int. Conf. Pairing-Based Cryptography, 2007, pp. 39–59(ODBE original dynamic broadcast encryption (ODBE) scheme) [10] L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving secure role-based access control on encrypted data in cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947–1960, Dec. 2013. (RBAC) [11] X. Zou, Y.-S. Dai, and E. Bertino, “A practical and flexible key management mechanism for trusted collaborative computing,” in Proc. IEEE Conf. Comput. Commun., 2008, pp. 1211–1219.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1700 [12] M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policy based content sharing in public clouds,” IEEE Trans. Know. Data Eng., vol. 25, no. 11, pp. 2602–2614, Nov. 2013. [13] D. Dolev and A. C. Yao, “On the security of public key protocols,” IEEETrans.Inf.Theory,vol.IT-29,no.2, pp. 198–208, Mar. 1983. [14] B. Den Boer, “Diffie–Hellman is as strong as discrete log for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530. [15] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2005, pp. 440–456. [16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98. [17] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance: The essential of bread and butter of data forensics in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [18] A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993 [19] B. Sheng and Q. Li, “Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks,” Proc. IEEE INFOCOM, pp. 4650, 2008. [20] D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 514-532, 2001. BIOGRAPHIES Miss. Ankita Ajay Jadhav Student in Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune, Mah, India. She pursued her BE (Comp) from Pune University, Mah,India in 2012 and Pursuing ME (Comp) from Jayawantrao Sawant College of Engineering, Pune, Mah, India. Her research interests include Cloud Computing Security.