SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7947
A LIGHTWEIGHT PROTECTED DATA SHARING METHOD FOR
MOBILE CLOUD COMPUTING
Suganaya. S1 and Dr. S. Chandrasekaran2
suganyasundharesan@gmail.com and chandrudpi@gmail.com
1PG Student and 2Assistant Professor, Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the popularity of distributed computing, cell phones can store/recover individual information from anyplace
whenever. Subsequently, the information security issue in portable cloud turns out to be increasinglyseriousand forestalls further
advancement of versatile cloud. There are significant examinations that have been led to improve the cloud security. Nonetheless,
the vast majority of them are not material for portable cloud since cell phones just have restricted registering assets and power.
Arrangements with low computational overhead are in incredible requirement for portable cloud applications. In this paper, we
propose a lightweight information sharing plan (LDSS) for portable distributed computing. It embraces CP-ABE, an entrance
control innovation utilized in typical cloud condition, yet changes the structure of access control tree to make it appropriate for
portable cloud situations. LDSS moves an expansive segment of the computational serious access control tree change in CP-ABE
from cell phones to outer intermediary servers. Besides, to lessen the client denial cost, it acquaints trait portrayal fields with
actualize sluggish repudiation, which is a prickly issue in program based CP-ABE frameworks. The exploratory outcomes
demonstrate that LDSS can successfully lessen the overhead on thecell phonesidewhenclientsaresharing information inversatile
cloud situations.
Key Words: mobile cloud computing, data encryption, access control, user revocation.
1. INTRODUCTION
The development of cloud computing and the popularity of smart mobile devices, peoplearegraduallygettingaccustomedtoa
new era of data sharing model in which the data is stored on the cloud and the mobile devices are used to store/retrieve the
data from the cloud. Typically, mobile devices only have limitedstoragespaceandcomputing power.Onthecontrary,thecloud
has enormous amount of resources. In such a scenario, to achieve the satisfactory performance, it is essential to use the
resources provided by the cloud service provider (CSP) to store and share the data.
Nowadays, various cloud mobile applications have been widely used. In these applications, people (data owners) can upload
their photos, videos, documents and other files to the cloud and share these data with other people (data users) they like to
share. CSPs also provide data management functionality for data owners.
The state-of-the-art privilege management/accesscontrol mechanismsprovidedbytheCSPareeither notsufficientornotvery
convenient. First, when people upload their data files onto the cloud, they are leaving the data in a place where is out of their
control, and the CSP may spy on user data for its commercial interests and/or other reasons. Second, people have to send
password to each data user if they only want to share the encrypted data with certain users, which is very cumbersome. To
simplify the privilege management, we propose a Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing
environment. The main contributions of LDSS are as follows:
(1) We design an algorithm called LDSS-CP-ABE based on Attribute-Based Encryption (ABE) method to offer efficient access
control over ciphertext.
(2) We use proxy servers for encryption and decryption operations. In our approach, computational intensive operations in
ABE are conducted on proxy servers, which greatly reduce the computational overhead on client side mobile devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7948
Meanwhile, in LDSS-CP-ABE, in order to maintain data privacy, a version attribute is also added to the access structure. The
decryption key format is modified so that it can be sent to the proxy servers in a secure way.
(3) We introduce lazy re-encryption and description field of attributes to reduce the revocation overhead when dealing with
the user revocation problem.
(4) Finally, we implement a data sharing prototype framework based on LDSS. The experiments show that LDSS can greatly
reduce the overhead on the client side, which only introduces a minimal additional cost on the serverside.Suchanapproach is
beneficial to implement a realistic data sharing security scheme on mobile devices. The results also show that LDSS hasbetter
performance compared to the existing ABE based access control schemes overciphertext.Therestofthispaperisorganizedas
follows. Section 2 presents some fundamental concepts in secure mobileclouddata sharingandthesecuritypremise.Section3
gives the detailed design of LDSS. Section 4 and 5 give the safety assessment and performanceevaluation,respectively.Section
6 presents related works. Finally, Section 7 concludes our work with the future work.
2 PRELIMINARIES AND ASSUMPTIONS
In this section, we first briefly present the technique preliminaries closely related to LDSS, and then present thesystemmodel
and some security assumptions in LDSS.
2.1 Preliminary Techniques
2.1.1 Bilinear Pairing
In our implementation, we usually take as a group consisting points on an elliptic curve, as a multiplicativesubgroupofa finite
field, e as a Weil or the Tate pairing based on an elliptic curve over a finite field. Further descriptions on how theseparameters
are defined and generated can be found in [28]. 0 G 1 G
2.1.2 Attribute-Based Encryption
Attribute-based encryption (ABE) is proposed by Sahai and Waters [29].ItisderivedfromtheIdentity-BasedEncryption(IBE)
and is particularly suitable for one-tomany data sharing scenarios in a distributed and open cloud environment. In real
applications, CP-ABE is more suitable since it resembles role-based access control. In CP-ABE, the data owner designs the
access control policy and assigns attributes to data users. A usercandecryptthedata properlyiftheuser’sattributessatisfythe
access control policy.
2.1.3 Secret Sharing Scheme
Shamir secret sharing scheme is used to protect secret information.
2.2 Security Assumptions
2.2.1 Semi-trusted Server
LDSS is designed under the same assumptions proposed in 0 that the CSP is honest but curious, which means that the CSP will
faithfully execute the operations requested by users, but it will peek on what users have stored in the cloud. The CSP will
faithfully store users’ data, undertake an initial access control, update data according to users’ requests. However, CSPmay do
malicious actions such as collusion with users to get the data in plain text.
2.2.2 Trusted Authority
In this paper, to make LDSS feasible in practice, a trusted authority (TA)isintroduced.Itisresponsibleofgeneratingpublicand
private keys, and distributing attribute keys to users. With this mechanism, users can share and access data without being
aware of the encryption and decryption operations.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7949
2.2.3 Lazy Re-encryption
In ciphertext access control, data needs to be re-encrypted when some users’ access privileges to the data are revoked.
However, frequent re-encryption brings heavy computational overhead,andtheaccessedplaintextdata mayalreadybestored
on these data users. Therefore, this paper adopts the lazy re-encryptionmethodproposedin[3].Withlazyre-encryption,when
a user’s access privilege is revoked, data is not re-encrypted until the data owner updates the data.
3 OUR PROPOSED MECHANISM
In this section, we describe the LDSS system design. First, we give the overview of LDSS, and then we present LDSS-CP-ABE
algorithm and system operations, which are the base of LDSS algorithm. Finally, we describe LDSS in details.
3.1 Overview
We propose LDSS, a framework of lightweight datasharing scheme in mobile cloud (see Fig. 1). It has the following six
components.
(1) Data Owner (DO): DO uploads data to the mobile cloud and share it with friends. DO determinestheaccesscontrolpolicies.
(2) Data User (DU): DU retrieves data from the mobile cloud.
(3) Trust Authority (TA): TA is responsible for generating and distributing attribute keys.
(4) Encryption Service Provider (ESP): ESP provides data encryption operations for DO.
(5) Decryption Service Provider (DSP): DSP provides data decryption operations for DU.
(6) Cloud Service Provider (CSP): CSP stores the data for DO. It faithfully executestheoperationsrequestedbyDO, whileit may
peek over data that DO has stored in the cloud.
LDSS-CP-ABE Algorithm
To better illustrate LDSS-CP-ABE algorithm, we first define the following terms.
Definition 1: Attribute An attribute defines the access privilege for a certain data file. Attributes are assigned to data users by
data owners. A data user can have multiple attributes corresponding to multiple data files. A data owner can define a set of
attributes for its data files. The data accesses are managed by access control policy specified by data owners. Let A = {A1, A2,
A3, ..., An} be the set of attributes for a data owner. Each data user u also has a set of attributes Au, which is a non-emptysubset
ends, teachers, peers,
Hubei, Beijing, Shanghai, degree of intimacy}. Definition 2: Access Control Tree Access control tree isthespecificexpressionof
access control policies, in which the leaf nodes are attributes, andnon-leafnodesare relational operatorssuchasand,or,nofm
threshold. Each node in an access control tree represents a secret, and the secretofa topnodecanbesplitintomultiple secrets
by secret sharing scheme and distribute to lower level nodes
described in Definition 1.
Definition 3: Version Attribute. Version attribute isintroducedinLDSS-CP-ABE algorithmtoensuresecurity.Itisan additionto
the original access control tree, forming a new root node of and. We have the following definitions.
T: The new access tree with version attributes.
S: The secret related to the root of T. Ta, Ra, Sa: Ta is the initial access control tree and the left subtree of T. Ra is the root of Ta.
Sa is the secret related to Ra. Tv, Rv, Sv: Tv is the right subtree of T and contains only one node, which represents the version
attribute Rv. Sv is the secret related to Rv. Both Sa and Sv are derived from S based on the secretsharing scheme. For the
example described in Definition 1, the access Encryption server provider(ESP) Decryption server provider(DSP).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7950
Setup(A, V): Generate the master key MK, the public key PK based on attribute set A of the Data Owner and the version
attribute V .
KeyGen(Au, MK): Generate attribute keys SKu for a data user U based on his attribute set Au and the master key MK.
Encryption(K, PK, T): Generate the ciphertext CT based on the symmetric key K, public key PK and access control tree T .
Decryption(CT,T,SKu): Decrypt the ciphertext CT using the access control tree T and the attribute keys SKu .
We explain all of these functions specifically below. First, function Setup() is called by the trusted third party (TA) to generate
the master key and the public key. The master key is used to generate attribute keys and the public key is used to encrypt data
files.
3.3 Attribute Description Field in LDSS-CP-ABE
Attribute description field is introduced in LDSS for dynamic user privilege management. It keeps access control strategy
secret against the cloud.
3.4.1 System Initialization
In system initialization, Function 1 is executed. The specific process is described as follows.
(1) When the data owner (DO) registers on TA, TA runs the algorithm Setup() to generatea publickeyPKanda masterkeyMK.
PK is sent to DO while MK is kept on TA itself.
(2) DO defines its own attribute set and assigns attributes to its contacts. All these information will besenttoTAand thecloud.
3.4.2 File Sharing
The process of file sharing uses Function 3 to encrypt data files. The specific process is described as follows.
(1) DO selects a file M which is to be uploaded and encrypts it using a symmetric cryptographic mechanism(suchasAES,3DES
algorithm) with a symmetric key K, generating ciphertext C.
(2) DO assigns access control policy for M and encrypts K with the assistance ofESPusingFunction3,generatingthe ciphertext
of K (CT).
3.4.3 User Authorization
The process of user authorization executes Function 2 to generate attribute keys for data users. The specific proc ess is
described as follows.
(1) DU logins onto the system and sends, an authorizationrequesttoTA.Theauthorizationrequestincludesattributekeys(SK)
which DU already has.
(2) TA accepts the authorization request and checks whether DU has logged on before. If theuserhasn’tloggedon before,go to
step (3) , otherwise go to step.
4. SECURITY ANALYSIS
The security assessment is based on the security assumptions we described in Section 3. The possiblescenariosthatmalicious
users may expose plaintext to others are not discussed.
4.1 Security Analysis of LDSS-CP-ABE
LDSS-CP-ABE algorithm is designed on top of Attribute- Based Encryption (ABE). The security of ABE is based on the bilinear
diffie-hellman assumptions.
4.2 Data Confidentiality against Conspiracy
The data confidentiality is taken into account from two aspects. In LDSS, dataareencrypted witha symmetrickey.Thesecurity
of this part is guaranteed by symmetric encryption mechanism. Next, the symmetric key is encrypted by attribute encryption.
The security of this part depends on the encryption process.
5 PERFORMANCE EVALUATIONS
The cost of data sharing comes from the execution of the function Encryption(), which is executed every time when sharing
data files. The function Encryption() includes exponentiation operation on G0 (the numberofoperationsisproportional tothe
number of attributes included in the access strategy) and one exponentiation operation on G1.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7951
Fig. 5.1 Computational overhead with different CP-ABES
5.3 Storage Overhead Evaluation
We also evaluate the storage overhead of LDSS and compare it with existing CP-ABE schemes.
5.3.1 Storage Overhead with Different CP-ABE Schemes
DO needs to keep PK, which is of the size (|A|+3)LG0+ LG1. DU also needs to keep SK, which is of the size (|Au|+4) LG0. TA
needs to keep PK and MK. MK is of the size LG0. The cloud needs to keep the symmetric key ciphertext CT, which is of the size
(2|Ta|+3) LG0+ LG1. DSP / ESP only do calculations and need not retain any value.
5.4 Communication Overhead Evaluation
The communication overhead of access control happens when TA sends keystoDO/DUatthestageofsysteminitializationand
user authorization, and DO/DU encrypt/decrypt the symmetric key which is used to encrypt the data files.
6. RELATED WORKS
In this section, we focus on the works of ciphertext access control schemes which are closely related to our research. Access
control is an important mechanism of data privacy protection to ensure that data can only be acquired by legitimate users.
There has been substantial research on the issues of data access control in the cloud, mostly focusing on access control over
ciphertext. Typically, the cloud is considered honestand curious.Sensitivedata hastobeencryptedbeforesending tothecloud.
User authorization is achieved through key distribution.
7. CONCLUSION AND FUTURE WORK
In recent years, many studies on access control in cloud are based on attribute-based encryption algorithm (ABE). However,
traditional ABE is not suitable for mobile cloud because it is computationally intensive and mobile devices only have limited
resources. In this paper, we propose LDSS to address this issue. It introduces a novel LDSS-CP-ABEalgorithmtomigratemajor
computation overhead from mobile devices onto proxy servers, thus it can solve the secure data sharing problem in mobile
cloud.
REFERENCES
[1]. Adam Skillen and Mohammad Mannan. On Implementing Deniable StorageEncryptionforMobileDevices.the 20thAnnual
Network and Distributed System Security Symposium (NDSS), Feb. 2013.
[2] Wang W, Li Z, Owens R, et al. Secure and efficient access to outsourced data. in: Proceedings of the 2009 ACM workshop on
Cloud computing security. Chicago, USA: ACM pp. 55-66, 2009.
[3] Maheshwari U, Vingralek R, Shapiro W. How to build a trusted database system onuntrustedstorage.in:Proceedingsofthe
4th conference on Symposium on Operating System Design & Implementation-Volume4.USENIXAssociation, pp. 10-12,2000.
[4]Boneh D, Franklin M. Identity-based encryption from the Weilpairing.in:ProceedingsoftheAdvancesinCryptology.Berlin,
Heidelberg: Springer-Verlag, pp. 213−229, 2001.
Bethencourt BSW CP-ABS
Data sharing
(2|Ta|+1)T_
G0+T_G1
(4|Ta|+1)T_ G0+T_G1 3T_G0+T_Gm
Data access (2|Au|+1)T_Ge (2|Au|+1)T_Ge T_G0+T_Gm

More Related Content

What's hot

IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computingijtsrd
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 

What's hot (19)

IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
20 74-1-pb
20 74-1-pb20 74-1-pb
20 74-1-pb
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Fog doc
Fog doc Fog doc
Fog doc
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
I42024349
I42024349I42024349
I42024349
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 

Similar to IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATAIRJET Journal
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 

Similar to IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing (20)

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
50620130101004
5062013010100450620130101004
50620130101004
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
C04932125
C04932125C04932125
C04932125
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7947 A LIGHTWEIGHT PROTECTED DATA SHARING METHOD FOR MOBILE CLOUD COMPUTING Suganaya. S1 and Dr. S. Chandrasekaran2 suganyasundharesan@gmail.com and chandrudpi@gmail.com 1PG Student and 2Assistant Professor, Department of Computer Science and Engineering P.S.V. College of Engineering & Technology, Krishnagiri ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the popularity of distributed computing, cell phones can store/recover individual information from anyplace whenever. Subsequently, the information security issue in portable cloud turns out to be increasinglyseriousand forestalls further advancement of versatile cloud. There are significant examinations that have been led to improve the cloud security. Nonetheless, the vast majority of them are not material for portable cloud since cell phones just have restricted registering assets and power. Arrangements with low computational overhead are in incredible requirement for portable cloud applications. In this paper, we propose a lightweight information sharing plan (LDSS) for portable distributed computing. It embraces CP-ABE, an entrance control innovation utilized in typical cloud condition, yet changes the structure of access control tree to make it appropriate for portable cloud situations. LDSS moves an expansive segment of the computational serious access control tree change in CP-ABE from cell phones to outer intermediary servers. Besides, to lessen the client denial cost, it acquaints trait portrayal fields with actualize sluggish repudiation, which is a prickly issue in program based CP-ABE frameworks. The exploratory outcomes demonstrate that LDSS can successfully lessen the overhead on thecell phonesidewhenclientsaresharing information inversatile cloud situations. Key Words: mobile cloud computing, data encryption, access control, user revocation. 1. INTRODUCTION The development of cloud computing and the popularity of smart mobile devices, peoplearegraduallygettingaccustomedtoa new era of data sharing model in which the data is stored on the cloud and the mobile devices are used to store/retrieve the data from the cloud. Typically, mobile devices only have limitedstoragespaceandcomputing power.Onthecontrary,thecloud has enormous amount of resources. In such a scenario, to achieve the satisfactory performance, it is essential to use the resources provided by the cloud service provider (CSP) to store and share the data. Nowadays, various cloud mobile applications have been widely used. In these applications, people (data owners) can upload their photos, videos, documents and other files to the cloud and share these data with other people (data users) they like to share. CSPs also provide data management functionality for data owners. The state-of-the-art privilege management/accesscontrol mechanismsprovidedbytheCSPareeither notsufficientornotvery convenient. First, when people upload their data files onto the cloud, they are leaving the data in a place where is out of their control, and the CSP may spy on user data for its commercial interests and/or other reasons. Second, people have to send password to each data user if they only want to share the encrypted data with certain users, which is very cumbersome. To simplify the privilege management, we propose a Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing environment. The main contributions of LDSS are as follows: (1) We design an algorithm called LDSS-CP-ABE based on Attribute-Based Encryption (ABE) method to offer efficient access control over ciphertext. (2) We use proxy servers for encryption and decryption operations. In our approach, computational intensive operations in ABE are conducted on proxy servers, which greatly reduce the computational overhead on client side mobile devices.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7948 Meanwhile, in LDSS-CP-ABE, in order to maintain data privacy, a version attribute is also added to the access structure. The decryption key format is modified so that it can be sent to the proxy servers in a secure way. (3) We introduce lazy re-encryption and description field of attributes to reduce the revocation overhead when dealing with the user revocation problem. (4) Finally, we implement a data sharing prototype framework based on LDSS. The experiments show that LDSS can greatly reduce the overhead on the client side, which only introduces a minimal additional cost on the serverside.Suchanapproach is beneficial to implement a realistic data sharing security scheme on mobile devices. The results also show that LDSS hasbetter performance compared to the existing ABE based access control schemes overciphertext.Therestofthispaperisorganizedas follows. Section 2 presents some fundamental concepts in secure mobileclouddata sharingandthesecuritypremise.Section3 gives the detailed design of LDSS. Section 4 and 5 give the safety assessment and performanceevaluation,respectively.Section 6 presents related works. Finally, Section 7 concludes our work with the future work. 2 PRELIMINARIES AND ASSUMPTIONS In this section, we first briefly present the technique preliminaries closely related to LDSS, and then present thesystemmodel and some security assumptions in LDSS. 2.1 Preliminary Techniques 2.1.1 Bilinear Pairing In our implementation, we usually take as a group consisting points on an elliptic curve, as a multiplicativesubgroupofa finite field, e as a Weil or the Tate pairing based on an elliptic curve over a finite field. Further descriptions on how theseparameters are defined and generated can be found in [28]. 0 G 1 G 2.1.2 Attribute-Based Encryption Attribute-based encryption (ABE) is proposed by Sahai and Waters [29].ItisderivedfromtheIdentity-BasedEncryption(IBE) and is particularly suitable for one-tomany data sharing scenarios in a distributed and open cloud environment. In real applications, CP-ABE is more suitable since it resembles role-based access control. In CP-ABE, the data owner designs the access control policy and assigns attributes to data users. A usercandecryptthedata properlyiftheuser’sattributessatisfythe access control policy. 2.1.3 Secret Sharing Scheme Shamir secret sharing scheme is used to protect secret information. 2.2 Security Assumptions 2.2.1 Semi-trusted Server LDSS is designed under the same assumptions proposed in 0 that the CSP is honest but curious, which means that the CSP will faithfully execute the operations requested by users, but it will peek on what users have stored in the cloud. The CSP will faithfully store users’ data, undertake an initial access control, update data according to users’ requests. However, CSPmay do malicious actions such as collusion with users to get the data in plain text. 2.2.2 Trusted Authority In this paper, to make LDSS feasible in practice, a trusted authority (TA)isintroduced.Itisresponsibleofgeneratingpublicand private keys, and distributing attribute keys to users. With this mechanism, users can share and access data without being aware of the encryption and decryption operations.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7949 2.2.3 Lazy Re-encryption In ciphertext access control, data needs to be re-encrypted when some users’ access privileges to the data are revoked. However, frequent re-encryption brings heavy computational overhead,andtheaccessedplaintextdata mayalreadybestored on these data users. Therefore, this paper adopts the lazy re-encryptionmethodproposedin[3].Withlazyre-encryption,when a user’s access privilege is revoked, data is not re-encrypted until the data owner updates the data. 3 OUR PROPOSED MECHANISM In this section, we describe the LDSS system design. First, we give the overview of LDSS, and then we present LDSS-CP-ABE algorithm and system operations, which are the base of LDSS algorithm. Finally, we describe LDSS in details. 3.1 Overview We propose LDSS, a framework of lightweight datasharing scheme in mobile cloud (see Fig. 1). It has the following six components. (1) Data Owner (DO): DO uploads data to the mobile cloud and share it with friends. DO determinestheaccesscontrolpolicies. (2) Data User (DU): DU retrieves data from the mobile cloud. (3) Trust Authority (TA): TA is responsible for generating and distributing attribute keys. (4) Encryption Service Provider (ESP): ESP provides data encryption operations for DO. (5) Decryption Service Provider (DSP): DSP provides data decryption operations for DU. (6) Cloud Service Provider (CSP): CSP stores the data for DO. It faithfully executestheoperationsrequestedbyDO, whileit may peek over data that DO has stored in the cloud. LDSS-CP-ABE Algorithm To better illustrate LDSS-CP-ABE algorithm, we first define the following terms. Definition 1: Attribute An attribute defines the access privilege for a certain data file. Attributes are assigned to data users by data owners. A data user can have multiple attributes corresponding to multiple data files. A data owner can define a set of attributes for its data files. The data accesses are managed by access control policy specified by data owners. Let A = {A1, A2, A3, ..., An} be the set of attributes for a data owner. Each data user u also has a set of attributes Au, which is a non-emptysubset ends, teachers, peers, Hubei, Beijing, Shanghai, degree of intimacy}. Definition 2: Access Control Tree Access control tree isthespecificexpressionof access control policies, in which the leaf nodes are attributes, andnon-leafnodesare relational operatorssuchasand,or,nofm threshold. Each node in an access control tree represents a secret, and the secretofa topnodecanbesplitintomultiple secrets by secret sharing scheme and distribute to lower level nodes described in Definition 1. Definition 3: Version Attribute. Version attribute isintroducedinLDSS-CP-ABE algorithmtoensuresecurity.Itisan additionto the original access control tree, forming a new root node of and. We have the following definitions. T: The new access tree with version attributes. S: The secret related to the root of T. Ta, Ra, Sa: Ta is the initial access control tree and the left subtree of T. Ra is the root of Ta. Sa is the secret related to Ra. Tv, Rv, Sv: Tv is the right subtree of T and contains only one node, which represents the version attribute Rv. Sv is the secret related to Rv. Both Sa and Sv are derived from S based on the secretsharing scheme. For the example described in Definition 1, the access Encryption server provider(ESP) Decryption server provider(DSP).
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7950 Setup(A, V): Generate the master key MK, the public key PK based on attribute set A of the Data Owner and the version attribute V . KeyGen(Au, MK): Generate attribute keys SKu for a data user U based on his attribute set Au and the master key MK. Encryption(K, PK, T): Generate the ciphertext CT based on the symmetric key K, public key PK and access control tree T . Decryption(CT,T,SKu): Decrypt the ciphertext CT using the access control tree T and the attribute keys SKu . We explain all of these functions specifically below. First, function Setup() is called by the trusted third party (TA) to generate the master key and the public key. The master key is used to generate attribute keys and the public key is used to encrypt data files. 3.3 Attribute Description Field in LDSS-CP-ABE Attribute description field is introduced in LDSS for dynamic user privilege management. It keeps access control strategy secret against the cloud. 3.4.1 System Initialization In system initialization, Function 1 is executed. The specific process is described as follows. (1) When the data owner (DO) registers on TA, TA runs the algorithm Setup() to generatea publickeyPKanda masterkeyMK. PK is sent to DO while MK is kept on TA itself. (2) DO defines its own attribute set and assigns attributes to its contacts. All these information will besenttoTAand thecloud. 3.4.2 File Sharing The process of file sharing uses Function 3 to encrypt data files. The specific process is described as follows. (1) DO selects a file M which is to be uploaded and encrypts it using a symmetric cryptographic mechanism(suchasAES,3DES algorithm) with a symmetric key K, generating ciphertext C. (2) DO assigns access control policy for M and encrypts K with the assistance ofESPusingFunction3,generatingthe ciphertext of K (CT). 3.4.3 User Authorization The process of user authorization executes Function 2 to generate attribute keys for data users. The specific proc ess is described as follows. (1) DU logins onto the system and sends, an authorizationrequesttoTA.Theauthorizationrequestincludesattributekeys(SK) which DU already has. (2) TA accepts the authorization request and checks whether DU has logged on before. If theuserhasn’tloggedon before,go to step (3) , otherwise go to step. 4. SECURITY ANALYSIS The security assessment is based on the security assumptions we described in Section 3. The possiblescenariosthatmalicious users may expose plaintext to others are not discussed. 4.1 Security Analysis of LDSS-CP-ABE LDSS-CP-ABE algorithm is designed on top of Attribute- Based Encryption (ABE). The security of ABE is based on the bilinear diffie-hellman assumptions. 4.2 Data Confidentiality against Conspiracy The data confidentiality is taken into account from two aspects. In LDSS, dataareencrypted witha symmetrickey.Thesecurity of this part is guaranteed by symmetric encryption mechanism. Next, the symmetric key is encrypted by attribute encryption. The security of this part depends on the encryption process. 5 PERFORMANCE EVALUATIONS The cost of data sharing comes from the execution of the function Encryption(), which is executed every time when sharing data files. The function Encryption() includes exponentiation operation on G0 (the numberofoperationsisproportional tothe number of attributes included in the access strategy) and one exponentiation operation on G1.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7951 Fig. 5.1 Computational overhead with different CP-ABES 5.3 Storage Overhead Evaluation We also evaluate the storage overhead of LDSS and compare it with existing CP-ABE schemes. 5.3.1 Storage Overhead with Different CP-ABE Schemes DO needs to keep PK, which is of the size (|A|+3)LG0+ LG1. DU also needs to keep SK, which is of the size (|Au|+4) LG0. TA needs to keep PK and MK. MK is of the size LG0. The cloud needs to keep the symmetric key ciphertext CT, which is of the size (2|Ta|+3) LG0+ LG1. DSP / ESP only do calculations and need not retain any value. 5.4 Communication Overhead Evaluation The communication overhead of access control happens when TA sends keystoDO/DUatthestageofsysteminitializationand user authorization, and DO/DU encrypt/decrypt the symmetric key which is used to encrypt the data files. 6. RELATED WORKS In this section, we focus on the works of ciphertext access control schemes which are closely related to our research. Access control is an important mechanism of data privacy protection to ensure that data can only be acquired by legitimate users. There has been substantial research on the issues of data access control in the cloud, mostly focusing on access control over ciphertext. Typically, the cloud is considered honestand curious.Sensitivedata hastobeencryptedbeforesending tothecloud. User authorization is achieved through key distribution. 7. CONCLUSION AND FUTURE WORK In recent years, many studies on access control in cloud are based on attribute-based encryption algorithm (ABE). However, traditional ABE is not suitable for mobile cloud because it is computationally intensive and mobile devices only have limited resources. In this paper, we propose LDSS to address this issue. It introduces a novel LDSS-CP-ABEalgorithmtomigratemajor computation overhead from mobile devices onto proxy servers, thus it can solve the secure data sharing problem in mobile cloud. REFERENCES [1]. Adam Skillen and Mohammad Mannan. On Implementing Deniable StorageEncryptionforMobileDevices.the 20thAnnual Network and Distributed System Security Symposium (NDSS), Feb. 2013. [2] Wang W, Li Z, Owens R, et al. Secure and efficient access to outsourced data. in: Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago, USA: ACM pp. 55-66, 2009. [3] Maheshwari U, Vingralek R, Shapiro W. How to build a trusted database system onuntrustedstorage.in:Proceedingsofthe 4th conference on Symposium on Operating System Design & Implementation-Volume4.USENIXAssociation, pp. 10-12,2000. [4]Boneh D, Franklin M. Identity-based encryption from the Weilpairing.in:ProceedingsoftheAdvancesinCryptology.Berlin, Heidelberg: Springer-Verlag, pp. 213−229, 2001. Bethencourt BSW CP-ABS Data sharing (2|Ta|+1)T_ G0+T_G1 (4|Ta|+1)T_ G0+T_G1 3T_G0+T_Gm Data access (2|Au|+1)T_Ge (2|Au|+1)T_Ge T_G0+T_Gm