Submit Search
Upload
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
•
0 likes
•
27 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i1/IRJET-V4I1194.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Paper id 27201446
Paper id 27201446
IJRAT
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Recommended
Paper id 27201446
Paper id 27201446
IJRAT
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
1784 1788
1784 1788
Editor IJARCET
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
J018145862
J018145862
IOSR Journals
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
csandit
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
IAEME Publication
Kp3419221926
Kp3419221926
IJERA Editor
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
1784 1788
1784 1788
Editor IJARCET
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
More Related Content
What's hot
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
1784 1788
1784 1788
Editor IJARCET
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
J018145862
J018145862
IOSR Journals
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
csandit
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
IAEME Publication
Kp3419221926
Kp3419221926
IJERA Editor
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
What's hot
(19)
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
1784 1788
1784 1788
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
J018145862
J018145862
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
Kp3419221926
Kp3419221926
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Similar to Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
1784 1788
1784 1788
Editor IJARCET
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
CSITiaesprime
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
A survey on cloud security issues and techniques
A survey on cloud security issues and techniques
ijcsa
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
Similar to Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
(20)
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
1784 1788
1784 1788
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
A survey on cloud security issues and techniques
A survey on cloud security issues and techniques
A study on security issues in cloud based e learning
A study on security issues in cloud based e learning
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1101 Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server Kalyanee Patil1, S. D. Khatawkar2, Amol Dange3 1 Student, Dept. of Computer Science and Engineering, Shivaji University Kolhapur, Maharashtra, India 2 Professor, Dept. of Computer Science and Engineering, Shivaji University Kolhapur, Maharashtra, India 3 Professor, Dept. of Computer Science and Engineering, Shivaji University Kolhapur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud storage is a service of clouds that causes, organizations to switch from establishing in-house data storage systems to the cloud. The advances that proposed recently have given rise to the popularity and success of cloud computing. However, when outsourcing the dataandbusiness application to a third party causes the security and privacy issues to become a critical concern. Within an organization, data need to be shared among different users with different credentials. Secure sharing of data among a such groupwhich causes an insider threat from valid or malicious user is an important research issue. Current approach provides a solution on aforementioned issue. Under this approach, the third party is an in charge of security related operations like encryption, decryption, key generation, accesscontrol, etc. But there may be a possibility that this third party may show malicious behavior and causes insider threat. A better approach should provide a solution which limits trust in third party while assuring data confidentiality. We propose an approach, based on two layers of encryption that addresses such requirement. Under our approach, the data owner performs a lower layer encryption, whereas the third party performs an upper layer encryption on top of the owner encrypted data. A challenging issue is how to maintain confidentiality of data. To implement it we shifted access control right distribution operation to the owner. The owner sends a key to valid users for encryption and decryption. This ensures only valid user will get an access to the data. Key Words: Cloud Computing, Confidentiality, Access control, Secure Sharing, Privacy, Security, etc. 1.INTRODUCTION CLOUD computing is rapidly emerging due to the provisioning ofelastic,flexible,andon-demandstorage and computing services for customers. Cloud computing offers an effective way to reduce capital expenditure and operational expenditure. This economic benefit is a main cause of the cloud popularity. However,SECURITYandprivacyrepresent major concerns in the adoption of cloud technologies for data storage. An approach to mitigate these concerns is the use of cryptography where data are usually encrypted before storing to the cloud [1]. Whereas cryptography assures the confidentiality of the data against the cloud, when the data are to be shared amongagroup,thecryptographicservicesneed to be flexible enough to handledifferentusers,exercise the access control, and manage the keys in an effective manner to safeguard data confidentiality. The data handling among a group has certain additional characteristics as opposed to two-party communication or the data handling belonging to a single user. The existing, departing, and newly joining group members can prove to be an insider threat violating data confidentiality and privacy. While adopting a cloud for storage, the loss of control over data and computation raises many security concerns for organizations. The loss of control over data and the storage platform also motivates cloud customers to maintain the access control over data (individual data and the data shared among a group of users through the public cloud).The cloud customer encrypts the data before storing to the cloud , this ensures cloud doesn’t learn any information about customer’sdata.Theaccessrightsaregiventodifferent users by distributing key used for encryption. However, this will result in excessive load over customers. By putting a third party in between customer and cloud and delegating all operational loads to a third party will help to lower load from the customer. But while doing so there is a possibilitythat third party may show malicious behavior. Hence there should be an approach to overcome this. In this paper,weproposeamethodologynamedSecure Data Sharing in Clouds through limiting trust in Third party/Server that deals with the aforementioned security. It helps to limit trust in third party/server. While delegating some operational load to a third party this approach ensures data confidentiality. For this the concept of two layer encryption is used where lower layer encryption is performedbythedataowner and upper layer encryption is performed by third party. The owner provides the authority of file access to user by proving key used for lower layerencryption,
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1102 while encryption or decryption of the file. Hence, by retaining control over operations back to data owner this approach helps to preserve confidentiality[2].The departing member cannot decrypt the data on its own as he/she will not able to get a key used for lower layer encryption from data owner. Similarly, no frequent decryption and encryption are needed for new user inclusion and user's departure. 2. SIGNIFICANCE Approach addressed in [3] relies completely on third party (CS) for security related operations like encryption, key generation, access control, decryption, etc., but there is a possibility that this third partyshowsthemaliciousbehavior and cause an insider threat. This approach has presented a way to limit trust level in third party(CS).The lower layer encryption at owner ensures that third party will not get direct access to data. File access authority is given by the owner by distributing key used for lower layer encryption. Even if a third party provides file to any unauthorizedusers, they unable to access it as they will not able to get a key for decryption from file owner. In addition, this approach causes less time consumption. In [3] for each user separate key shares are needed to be calculated during encryption and during decryptionoriginal key needs to be computed from shares. Also for new user inclusion separate key shares need to be calculated. In our approach only two keys require one for lower layer encryption and another for upper layer encryption. Hence time for key share generationduringencryption,original key computation during decryptionandgenerationofkeyshares for newly joining members get eliminated. 2. RELATED WORK Approach addressed in [3]provideda wayforsecuresharing of data among users with different level of privilege.Thereis a third party in between customer and cloud who is responsible for performing security related operations like key management,encryption,decryption,andaccesscontrol. Data is encrypted using a single symmetric key. Two different key shares are generatedforeachuser.Oneshareis given to the user and the other is kept by a third party named Cryptographic server. User with one share ensures security from the insider threat. However, this approach relies completely on third party, there is possibility that third party shows malicious behavior and cause an insider threat. As suggested in [2], to overcome the insiderthreat to cloud confidentiality one defensestrategyistoretaincontrol back to the owner. But it will cause excessive load over owner. As Suggested in [4], the cloud generates the public– private key pairs for all of the users and transmits the public keys to all of the participating users. Partial decryption is performed at the cloud. Due to the fact thatkeymanagement and partial decryption are handled by the cloud, user revocation is easier to handle. However, the proposed scheme treats the public cloud both as a trusted and untrusted entity at the same time. From a security perspective, it is not recommended to shift the key generation process to the shared multitenant public cloud environment. This paper presented an approach which helps to counter the aforementioned issue. We have used two layer encryption schemes as suggested in [5]. The lower layer encryption by data owner ensures that third party will not able to access owner’s data. Authority to access data is given by data owner by transferring key used for lower layer encryption to the user. This ensures that third party will not able to give an access to any unauthorized user. Even if he does so that unauthorized user will not able to read it in the absence of key used for lower layer encryption. In this way, by retaining control over some operations this approach ensures cloud confidentiality. 3. POPOSED WORK :- File (1) User registration; (2)FileUpload;(3)DownloadRequest; (4) File Download Fig -1: System architecture of Secure Data Sharing in the Cloud through limiting trust in Third party/server Figure1 shows the basic architecture of “securedata sharing in the cloud through limiting trust in third party/ Server”. This proposed system will work withfourentitiesasfollows: 1) owner; 2) user; 3) server and 4) cloud. The data owner first assigns a unique ID to each user of his files. The users then register with owner by providing his own password. The owner maintains information about each user in list- User List containing unique id and password. The information about users also sends to a third party for storage. While uploading file to cloud the file owner will perform lower layer encryption and submit the encrypted file. Server after receiving a file performs upper layer encryption on it. The encrypted data then subsequently get uploaded to the cloud for storage. The file owner assigns access right (read/write) on file to users. The list of users, their access right and otherinformationlikedatefromwhich access right is valid will get sent to the third party server .This information gets maintainthereintheformofACL. ACL is maintained for each file containing file id, user id, date, access right. The user who wishes to access the file sends a
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1103 download request to the third party server. The third party server receives the unique ID and password from the user, after authenticating the requesting user it downloads the data file from the cloud. The data filegetsdecryptedandsent back to the user. User after receiving file requests a key to the owner. The owner provides the key he has used to perform lower layer encryption.Userdecrypts a filewith key he has received from the owner. For a newly joining member, the owner assigns a new unique id and user then register with owner. The owner will send the information regarding this user to the server to maintain it in anACL.For a departing member, the record will deleted from all respective tables. 4. IMPLEMENTATION STRATEGIES 4.1 User Registration: This operation is performed by the file owner. The owner of a file will first assign a unique ID (ID) to each user of his files. Then user registers with this unique id with owner by providing his own password (PassW). Figure 2 shows user registration operation. Fig -2: User Registration 4. 2 File Upload 4.2.1 Lower Layer Encryption Algorithm: R = {0, 1}^8 // R is any random number Kf= Hf(R) // after applying hash function the R will completely randomized F’ = SKA(F, Kf) For each file F separate key Kf is generated. Kf is generated in two steps. In the first step, the random numberR oflength 8 bits is derived by the file owner. In the next step, R is passed through a hash function that could be any hash function with a 128-bit output. The length of Kf is 128 bits. However the length of the key can be altered according to requirement. The file then encrypted with a symmetric encryption algorithm using generated key Kf. After successful encryption, encrypted file F’ gets sent to the server. 4.2.2 Upper Layer Encryption: Algorithm: R = {0, 1} ^8 // R is any random number K’f= Hf (R) // after applying hash function the R will completely randomize C = SKA(F’, K’f) The third party server is responsible for upper layer encryption. For this it generates a key(K’f) oflength 256 bits. The key K’f is generated in two steps. In the first step, the random number R of length 8 bits is derived by the third party server. In the next step, R is passed through a hash function that could be any hash function with a 256-bit output. The length of K’f is 256 bits. However the length of the key can be altered according to requirement. The file then encrypted with a symmetric encryptionalgorithmusing generated key K’f. Aftersuccessful encryption,encrypted file C gets sent to cloud for storage. Figure 3 shows a file upload operation which involves both lower layer encryption at owner and upper layer encryption on the server. Fig -3: File Upload 4.3 File Download This operation requires a decryption to be performed twice. First at the server and other by requesting user. Figure 4 shows download operation. 4.3.1 Decryption at the Third Party Server Algorithm: Get IDi and PassWi from the requesting user i. Perform authentication and verify access right. if authentication failed or access is not valid, then Return the access denied message to the user. else Download C from the cloud. F’ = SKA(C, K’f) send F’ to the user. end if Whenever any user wants to download any file, he/she sends a request to the third party server. The third party
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1104 server after getting a request authenticate user and after successful authentication download requested file from the cloud, decrypts it and sends it to the user. 4.3.2 Decryption at the Requesting User User after getting file from a third party server decrypts it. For this, the user requests a key to the file owner. Fileowner after performing successful authentication sends a key. The user then decrypts a file with a key he/she got from the owner. Algorithm: F=SKA(F’,Kf) Fig -4: File Download 4.4 File Update This operation requires lower layer encryption to be performed by the user who updates the file. For this, user requests for a key to file owner. File owner after performing authentication sends a key. The user then performs encryption on data and sends update request to the server. For encryption, user uses symmetric encryption algorithm used in algorithm 1. The server performs authenticationand check whether the requesting user has update permission. After a successful authentication server performs upper layer encryption and upload file to the cloud.For encryption, server uses symmetric key encryption algorithm used in algorithm 2. Figure 5 shows update operation. Fig -5: File Update 4.5 New User Inclusion and Departure The inclusion of new user is made by registering user with owner by providing new id. This information stored by the owner in the user list. This information also gets sent to the third party server for storage. For newly joined member owner assigns access rights on files. This information also gets sent to the third party server to include it into ACL. The information contains file id, user id, date from which access right is valid, access right. The provision of date ensures backward access control. For departing member, the server is notified by the owner. The third party sever then deletes all records related to the user from ACL. The departing member will not able to decrypt data by its own. Hence this ensures forward access control. 5. PERFORMANCE EVALUATION 5.1 Experimental Setup To evaluate the performance of the proposed methodology, we implemented the methodology in Eclipse using the JAVA framework. As discussed earlier, the proposedmethodology consists of four entities, the cloud, the third party server, owner and the users. The jelastic cloud service which serves as the cloud server in our implementation. The third party and file owner are implemented as a server using apache tomcat. This implementation follows the MVC model.Where the view is implemented using jsp/html, control is nothing but servlets. The functionalities required by the user that is user level encryption and decryption are implemented as a TCPclient application that connects with the owner to receive the key. This communication is secured by SSL protocol. The functionality that required by the owner to provide key is implemented as a TCPserver application which always kept in running mode. The communication between the entities Owner and the third party is accomplished using URL class (java.net.URL). The class HTTPsURLConnection is used toopena secureconnectionto another entity. The scheme uses the SHA-1 hash functionfor generating keys at the owner and SHA-256 hash functionfor generating keys at third partyserver.TheAESfor encryption and decryption is used. All of the cryptographic operations like encryption and decryption are implemented using a javax.crypto.Cipher.Theclassjava.security.MessageDigest is used to access all of the methods related to SHA. The hardware characteristics for the Third Party, Owner andthe user client are shown in Table 1. Table -1: Hardware Specification CPU Intel(R) CoreTM i3- 3217U CPU 2 @ 1.80GHz RAM 4 GB
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1105 Storage 100GB OS Windows 7 64 bits 5.2 Results We evaluated the methodology on the basis of the total time consumed to upload/ download a file to/from thecloud.The total time is composed of the time from the time of submission of request to the CS to the point of time at which the file is uploaded/downloaded to/from the cloud. The following times are included in the total time: 1) the key computation timeatownerandthirdpartyserver; 2) the encryption/decryption time at owner/user and third party server; 3) the upload/download time; 4) the time of request and other related data submission to the CS and the cloud. Fig. 6 shows the results for the upload time. All of the constituent times are represented by separate line graphs. The term “others” refers to the fourth constituent time discussed previously. In general, the time to upload the data increased with the increase in the file size. However, some marginal changes in time are due to network condition at that time. Hence, the file upload time was dependent on the network conditions. The key computation time is independent of file size and almost remained constant. The encryption time increased with the increase in the file size. Fig. 7 shows the results for the downloadoperationinvolved in downloading the file from the cloud and the subsequent decryption processes. The trend of results is similarasinthe case of a file upload. However, the times in decryption and the download are changed. There is no need to compute key during download procedure. Hence Key computationtime is eliminated. We have compared our methodology with the scheme presented in [3]. The comparison is on the turnaround time for encryption and decryption. Table 2 shows the turnaround times for upload and Table 3 for download. These tables reveal that the SeDaSCmethodology outperforms the other technique. Table -2: Comparison of Turnaround time for File Upload File Size (MB) Encryption Time(Sec) Key Computation Time(Sec) Total Upload [3](Sec) Total Upload (This System)(Sec) 0.5 0.101 0.001 0.94 0.384 1 0.240 0.001 1.24 0.376 10 2.268 0.001 6.43 3.390 50 6.589 0.001 9.01 8.220 100 11.371 0.001 17.37 13.791 Fig -6: Performance of File Uploads Table -3: Comparison of TurnaroundtimeforFileDownload File Size (MB) Decryption Time(Sec) Total Download [3] (Sec) Total Download(This System)(Sec) 0.5 0.711 0.96 0.871 1 0.231 1.18 0.421 10 1.471 6.48 4.663 50 7.405 10.24 8.016 100 16.939 20.68 17.791 Fig -6: Performance of File Downloads
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1106 6. Limiting Trust in Third Party or Server Approach addressed in this paper works on a future work of previous approach that is limit trust in third party (CS). The previous approach relies on third party for performing security related operations like encryption, decryption, key generation, access control, confidentiality management, etc. However, the third party is trusted one there may be possibility that it can lead to an insider threat. Hence there should be an approach which ensures data security by keeping control over some operations at data owner. In the previous approach as owner transferhisdata asitisto the third party/server. In this case the server can read that data and also can transfer this data to anyone. Unlike previous approach, in the proposed approach,encrypted file is handed over to the third party instead of the original file. This ensures third party will not get direct access to the owner’s data. In the previous approach third party assigns permissions to each user by providing one key share. As third party has control over this operation, he/she can able to show any malicious user as an authorized by providing one key share. In the proposed approach owner assigns permissions to each user by providing key used for lower layer encryption. This ensures that only authorized users will get an access to the file. For example, suppose if third party provide files to any malicious user, that user will not able to decrypt them in the absence of key used for lower layer encryption. 7. CONCLUSIONS We proposed a methodology for secure sharing of data among multiple users with different credentials. The proposed methodology provides data confidentiality,secure data sharing without reencryption, access control for malicious insiders, and forward and backward access control. Moreover, proposed methodology addressed problems in previous approach and provided its effective solution. The approach provided here can be extended by strengthening accountability. Here users are differentiated by user id’s and password. One can provide an approach which uses different way of ensuringaccountabilityofusers. One can provide an alternative approach for limitingtrustin third party/server. REFERENCES [1] Cloud Security Alliance, “Security guidelines for critical areas of focus in cloud computing v3. 0,” 2011. [2] Zhifeng Xiao and Yang Xiao, Senior Member,IEEE, “Security and Privacy in Cloud Computing”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013. [3] Mazhar Ali, Student Member, IEEE, Revathi Dhamotharan Eraj Khan, Samee U. Khan, Senior Member, IEEE, Athanasios V. Vasilakos, Senior Member, IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow, IEEE,”SeDaSC: Secure Data Sharing in Clouds”IEEE SYSTEMS JOURNAL 2015. [4] S. Seo, M. Nabeel, X. Ding, and E. Bertino, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Trans. Knowl. Data Eng., Vol. 26, no. 9, pp. 2107–2119, Sep. 2013. [5] Mohamed Nabeel and Elisa Bertino,Fellow, IEEE,Privacy Preserving Delegated Access Control in Public Clouds”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 9, SEPTEMBER 2014.
Download now