Submit Search
Upload
Towards Achieving Efficient and Secure Way to Share the Data
•
0 likes
•
26 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i7/IRJET-V4I7649.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
Â
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Â
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Â
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Â
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
Â
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Â
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
Â
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
Â
Recommended
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
Â
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Â
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Â
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Â
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
Â
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Â
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
Â
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
Â
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Â
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
Â
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Eswar Publications
Â
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
Â
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
Â
Ppt 1
Ppt 1
shanmugamsara
Â
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
Â
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Â
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
Â
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
Â
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Â
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
Â
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Â
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
Â
Oruta project report
Oruta project report
Manasa Chowdary
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
Â
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
Â
R180203114117
R180203114117
IOSR Journals
Â
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
Â
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Â
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Â
More Related Content
What's hot
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Â
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
Â
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Eswar Publications
Â
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
Â
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
Â
Ppt 1
Ppt 1
shanmugamsara
Â
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
Â
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Â
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
Â
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
Â
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Â
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
Â
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Â
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
Â
Oruta project report
Oruta project report
Manasa Chowdary
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
Â
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
Â
R180203114117
R180203114117
IOSR Journals
Â
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
Â
What's hot
(20)
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Â
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
Â
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Â
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
Â
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
Â
Ppt 1
Ppt 1
Â
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Â
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Â
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Â
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Â
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Â
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
Â
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Â
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Â
Oruta project report
Oruta project report
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Â
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Â
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
Â
R180203114117
R180203114117
Â
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Â
Similar to Towards Achieving Efficient and Secure Way to Share the Data
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
Â
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
Â
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Â
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
Â
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
Â
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
Â
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
Â
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
Â
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET Journal
Â
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Â
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
Â
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
Â
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
Â
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
Â
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
Â
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Â
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
Â
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Â
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
Â
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
Â
Similar to Towards Achieving Efficient and Secure Way to Share the Data
(20)
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Â
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
Â
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Â
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
Â
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Â
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
Â
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
Â
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
Â
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
Â
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
Â
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Â
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Â
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Â
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
Â
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
Â
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Â
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Â
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Â
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
Â
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Â
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Â
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Â
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Â
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Â
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Â
Recently uploaded
(20)
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Â
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Â
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Â
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Â
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Â
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Â
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Â
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Â
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
Â
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Â
Towards Achieving Efficient and Secure Way to Share the Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3251 Towards Achieving Efficient and Secure way to Share the Data Sreevathsa C.V1, Rajeshwari R2, Meghana B3 1,2,3 Bachelor of Engineering, Department of ISE, SKIT, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The impact of the cloud computing technique made users to store and share their data easily and accessible anywhere and at any point of time. The cloud can handle huge amount of data where the data is storedin datacenterwhichis placed in a remote place. The users can use the serviceofcloud for personal or the professional use depending onthepurpose. The continuous use of the cloud is prone to number of security attacks because users now store and share the data using cloud rather than any other means. There arenumberofcloud service providers and the third-party platforms where the users store their data and those stored data will be shared to other users or to the group. The data may be accessed for the public or the private use. When the data is kept for sharing certain security measures should be taken such that the data of the users is secure in the cloud. There may be major security attacks in the cloud so when the data is shared certain cryptographic and authentication techniques should be given in order to protect the data of the users. Thesecuritymeasures must be strong enough and have to be updated frequently as the cloud service updates its settings. Also the efficiency of the cloud service which handles the data must be goodand itmust use the resources well. The resources must be idle when the data is not in use which saves the energy. Themechanismmust be very efficient even when the data is shared among multiple users. Key Words: Cloud Computing, security, efficiency 1. INTRODUCTION Cloud services have been used by the users for its flexibility and ability to store huge amount of data. Using the services of the cloud the stored data can be sharedamongindividuals or the group of users. It is one of the major aspect in which the users stick on this service. The small scale users or the major organizations have been into data sharing because it increases their productivity. Also the data sharing facility reduces the amount of time to spend on sharing on the huge amount of data irrespective of the physical devices which may take more time to share. Multiple users can access the same data at the same time on the same platform. The Fig.-1 shows the structure of the multiple users’ access the same cloud service in which data is shared. This leads to the less usage of time and the cost to build and maintain the storage structure. The storage can be set up once and thedata canbe stored and shared among multiple users at a time using the same storage. The datacenter should be maintained such that it is efficient to handle the multiple requests from the users and the resources allocated to them. However, the cloud services have to meet the confidentiality,integrityand privacy of the user’s data which is stored. There may be anonymous users over the internet where the send fake request for the resources in which authentication must be set up [5] for the cloud service to its storage and the shared data. To provide security some identity based signatures have to be used have been proposed. Authentication is very much important for the organizations in order to share data on a large scale even if there is single or multiple users to maintain its confidentiality. Security in the public cloud is most important [10] because in order to protect the shared data and resources of the users from the possible attacks. The best solution provided is to add a two step authentication technique by using a private key toshareand encrypt using the session keys. Even though it may prevent attacks such as key escrowandreducescomputational costit is limited to the image based authentication and the private key which is used for once for sharing purpose it uses Hash functions to generate the keys which can be unlocked easily. The users can store and share the data in cloud butunable to control the data which is stored in the remote datacenters [11]. Thus, controlling the data in the remote site and maintaining its integrity is the major task. In order to overcome these problems the technique using function proxy re-encryption is used. Here the change is in the decryption process where the entire processdependsonthe user’s secret key in which a string has been linked. In turn the string is linked with the cipher text which holds a string if its matches decryption will be made. This method will provide some means of security but it consumes lot of time in re-encryption process where a delay can be introduced. There may be other aspects in cloud such as there may be multi-owner for the sameshareddata andthegroupsmaybe dynamically formed in the cloud [12] which uses One-Time Password [OTP] which is the easiest way and the most popular mechanism which is being used. The OTP is the authenticationtechniquefor securingtheaccountwhichmay be used in different machines. It provides three levels of security using mixture of image and password generation technique. The level 1 and 2 are based on the captcha and after successful solving the captcha the user gets the OTP. This technique is very basic and the image related grid can be easily solved. Thus, it moves a little step down in terms of providing a strong security to the cloud to handle theshared data. There must be some strong mechanismstohandledata especially when it is shared among multiple users and an efficient approach needed to be used.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3252 Fig -1: Multiple users trying to access the same shared data in cloud service. 1.1 Related Work Whenever there is a term cloud service there always exists some common term that is security. Security is animportant aspect which has to be taken care by the users who use the cloud service and the vendor who provide the cloud service to the user. The vendors may provide storage to the users from the various datacenters which is located in the remote places. The datacenters may not be secured enough and prone to some of the security attacks. The storage from the datacenters may be scalable in use but the quality of the service provided by the third-party sources [4] must be highly important in order to use the cloud service. As the cloud service has become one of the on-demand services which are used in day-to-day life some intelligent way of authentication is required to safeguard the resources and data of the users when both stored and shared.Athird-party authentication is kept to audit and detect any intrusion or the attack in the cloud. The third-party authenticator may provide some sort of security by providingsomegeneralized authentication methods and safeguard the data. The shared data may be divided into number of blocks and then it may be shared. There are chances that few blocks may not be transmitted and there may be few errors in auditing results which declines the authentication mechanism. The audit record may contain some redundant data inwhichitmayfail few mechanisms which affects the security of the system. The Log records [7] may be used by the several organizations in which they maintain a log file which may contain some of the important data of services which may provide security to the data stored in the datacenters. The log file must be maintained as long as data iskeptforsharing it requires some of the additional cost because for the maintenance purpose. The new algorithms or the methods should be found out to eliminate the use of the log records and reduce its expenses for the organization. Integrityofthe data cannot be maintained by the use of the log files because multiple auditing techniques are required for the purpose. The cloud service has a drawback in the de-centralized auditing and the information from the audit must be properly accounted [6] which can be built into a framework called Cloud Information Accountability [CIA]. The CIA will monitor the flow of the shared data in the cloudandprotects the user data from the attacks by using some of the object- oriented mechanisms which performs actions based on the automated logging system which ensures theauthentication of the users’ login and protects the data. The technique may in the form of the image which is uses as the encryption technique named as chaos image. It is a scramble image consists of the jumbled pixels which are randomly distributed. Due to high randomness of the scattered chaos image it is very difficult to decrypt and to find the correct position of the scramble image thus providing a bit of enhanced security. In [9] a new approach called the log and log harmonizer is used in which it takes helpoftheJARfile to provide additional layer of security to the cloud service. As soon as the user request any data in the cloud it generates the JAR file upon its creation the authentication request and response will be obtained through the help of the service provider and the JAR file is decrypted if the authenticationis matched the data logs are sent to the users else the data will not be shared or can’t be accessed by the user. As this technique a light-weight approach it could be statedthatitis efficient. Yet it is not applicable for the multi-cloud environment. There may be some modifications to the data in the cloud when the data is shared among the group members who are authorized for the access of the shared data. Integrity has to maintain for the modifications in the groups [8] who have the authorization. The data may have been divided into number of blocks and may be accessed by the users. A technique of digital signature is added to the block of data and the signature has to be made while modifying the data. The data has to been signed by all of the users in the group and have to access by the signatures and have to re-sign the data when it is modified for the security purpose. If any of the users exit from thegroup re-signhasto be done by all the users. Thus, hereby maintaining the integrity of the data and providing somesortofprotection to data of the users. Making into further move for the security and efficiency of the data higher level signatures may be required where there is large numbers of anonymous users in the cloud. Ring-Signature [3] is used for this purpose where the cloud storage and its analysis can be made. As the Public-key infrastructure (PKI) requires various steps including certificate verification and aspect it becomes a cumbersome approach. So, the idea of Identity-based (ID- based) ring signaturemay be proposedby providingforward security. If the secret keys have been generated previously even those keys become valid thus it saves the time generating keys. Thus, generating and maintaining the keys will be reduced and it will be very effective to implement to use. As the smart-grid approach will be used in which all the keys will be stored and those are valid keys used by the users to authenticate the energy consumption will be less and thus its efficiency may increase. [2] Ring-signatures try to build a trust among the users by sharing the accurate information to the users. When the clusters have been made to share data among the group the ID-based signatures has to be applied and it uses RSA algorithm to provide security and increase its efficiency. [1] TheID-basedRingsignatureis
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3253 efficient which doesn’t require any pairing operation. The size of its secret key is very small may be just a size of a single integer. It may be implemented in a multi-cloud system because of its efficiencyasit’srequireslessspaceand time for its operations to take place. Thus, an attempt is made to move a step forward of these approachestoprovide security and increase the efficiency when data is shared in cloud. 2. PROPOSED SYSTEM The various types of security measures have been described such as using session keys and ID-based Ring signatures mechanisms. When these types of systems are used considerable amount of protection is given to the cloud services and secure the data which is being stored and shared among various users. Thoughthiskindofmechanism is found to be efficient way to secure the shared data it is having its own drawbacks as mentioned. Anattemptismade to propose a system which provides a better security to the shared data which is being shared among multipleusersand could be accessed efficiently which lesser amount of time and the cost to implement it. In this system a cloud system is setup such that it holds huge amount of data in which its services are scalable. Fig -2: A Set-up for Secure Sharing of Data in Cloud. In this system certain groups are made in which data has to be shared among multiple users in the cloud. As in Fig -2,the data which has to be shared is placed in the cloud. Some credentials are kept at the interface of the cloud suchthatno other users can access the data. In the group the numbers of members have to be fixed and the particular membersofthe group have to be assigned a user-id and key should be generated when a request is made in order to access the shared data which should be dynamic. Here the database is very small and it contains the list of group members and the key. The key will be generated as soonastherequestisbeing made and stored in the database which is temporary. As soon as the requested work is complete the generated key will be disposed. Thus, the amount of data in the database will be reduced. This is taken care by the F1 functional block in which in which it has all the details of the group and its members. It consists of all the group members’ id(s) and the data which is requested. AES technique is used to generate the key dynamically which is one of the most secure encryption techniques. In turn the generated key is Hashed and stored and then sent to the Group lead. The Group lead consists of the key and the user-id of the particular member of the group and request to the cloud for the data which has to be shared. The group member anditskeyisdecryptedand checked for its validity by the F2 functional block. If the key and the user-id are matched then the data will beshared else the data will not be shared. While transmittingthedata from the cloud to the users the data will be encrypted and sent using the same AES technique and the key will be generated dynamically again. While data issharedthekeyandtheuser- id will be checked if it matches the users can access the data. This is done because to prevent any attack in the cloud. As the amount of the data in the database which is used tostore member-id, key and the hash value is very less as the key and the hash value is dynamic it can be accessed at a faster rate. More the data in the database, lesser will be the performance of the system. Thus, reducing the databasewill increase the performanceofthesystem.Thekeyingusingthe AES technique will be of 192 or 256 independent bits for extreme encryption and which in turn the key is hashed and it is sent to the Group lead and stored. Thus thispreventsthe attack from external source which may be of man-in-middle attack, or the denial of service. 3. RESULTS The various techniques such as OTP and the captcha techniques used for the security purpose which are prone to man-in middle attack or the time- delay. So those methods are not secure to use to share the data. The smart-grid technique which is based on the Id-based Ring signature mechanism is very time consuming and it relay on the clusters which is not dynamic. So,usingtheproposedsystem the keys can be generated dynamically for the dynamic group in which data is shared in the cloud. This system uses AES technique which is proven to be very efficient and vey secure as it provides a lengthy key of 192 or 256-bits which in turn padded and hashed. The AES is faster in both hardware and the software environment in which it is widely used. As the encryption and decryption is done while requesting and transmitting this system will be powerful as the authentication is checked twice as there is no delay and faster in accessing the data from the cloud. 4. CONCLUSIONS The proposed system will use lesser database to store the keys which is generated dynamically and will be recycled after the request is being processed completely. And then generates the key for each request is being made. Thus, the security is provided to the system and authentication is made both by the group members and the group lead so security issues have been resolved by this technique. As the AES encryption technique is used for this system it is less prone to attack, the key and the data transmission rate will
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3254 be faster. As the double protection is given between group members and the cloud it is very efficient and less prone to attack. So, implementing this system will provide better security while sharing and transmittingthedata inthecloud. If the data is stored in any datacenter which is located in remote places the users need not worry. As the efficient encryption technique of AES is used by the system and the key size is bigger and dynamically generated at the time of use, in the remaining time the system will be idle so the performance will be increased as the energy utilization will be less. ACKNOWLEDGEMENT This work is made with the author’s interest, with regard to the cloud services and itsdatasharingfacility.Theauthor’s made an attempt to propose a solution for the efficiency and security of the cloud service through this paper. REFERENCES [1] Bindumol V S,Dr.VarghesePaul, “ForwardSecureIdentity Based Ring Signature for Data Sharing in the Cloud”,IJSTE, Volume 2, Issue 02,August 2015. [2]Mrs.S.ArogyaSwarna, Ms.Shirin, AyishaMaryam.M, “Increasing Security Level in Data Sharing Using Ring Signature in Cloud Environment”,IJERA,Vol.6,Issue2,(Part - 6) February 2016, pp.01-06. [3] Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”,IEEE TRANSACTIONS ON COMPUTERS, VOL.64 , NO.6, 2015. [4]G.Ranjith,J.Vijayachandra,P.Sagarika and B.Prathusha, “Intellingence based Authentication- Authorization and Auditing for Secured Data Storage” ,International Journal of Advances in Engineering &Technology, August, 2015. [5] M.Manipriya, C.Yalini, “Authenticate Data Distribution BasedOnUserIdentity”,International Journal onApplications in Information and Communication Engineering, Volume 2, Issue 5,May 2016, pp 25-28. [6] Swapnil Dattatraya Taru, Prof. Vikas B. Maral“Secure Data Sharing in Cloud for Distributed Accountability using Patchy Image Encryption”,IJIRCSMS,Volume 2, Issue 12, December 2014. [7]Vikram.J ,M.Kalimuthu,“A Comparative Study onPrivacy- Preserving Public Auditing for Secure Cloud Storage”,IJIRCCE,Vol. 2, Issue 11, November 2014. [8]Elayaraja.D, J.Caroline EL Fiorenza, “An Efficient Approach for Data Sharing in Cloud Computing UsingDigital Signature”, International Journal of Computer Techniques, Volume 2 Issue 2, 2015. [9] Nilutpal Bose, Mrs. G. Manimala, “Secure Frameworkfor Data Sharing in Cloud Computing Environment”, IJETAE,Volume 3, Special Issue 1, January 2013. [10]Roshni Sharma,Prof. AmitSaxena,Dr. Manish Manoria,“An Efficient Data Sharing in Public Cloud usingtwo way Authentication &Encryption”, International Journal of Computer Science and Information Technologies(IJCSIT), Vol.6(5),2015,4807-4811. [11]S.I.ShaikHussain,V.Yuvaraj,K.Vishnu,“AnAssessmenton Various Secure Data Sharing Methods in Public Cloud”, IJAICT, Volume 1, Issue8, December 2014, Doi:01.0401/ijaict.2014.08.06. [12] P Lavanya, S Komala and N Vikram, “Anonymous Data Sharing Scheme for Dynamic Groups in an Untrusted Cloud”,IIJCS,Volume 2, Issue 8, August 2014.
Download now