SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 452
A Survey on Secure Data Accessing and Sharing Using
Cryptographic Algorithms in Cloud Computing Environment
J. Mala*, Dr.A.N. Jayanthi**
, S. Rajesh***
*
(Information Technology, Sri Ramakrishna Institute of Technology, Coimbatore)
**
(Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Coimbatore)
***
(Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore)
Abstract
Data sharing in the cloud is a method that allows users to conveniently access data over the cloud. The data owner
outsources their data in the cloud due to cost reduction and the great accessibilities provided by cloud services. Data owner is
not able to control over their data, because cloud service provider is a third party user. The major problem with data sharing
and accessing in the cloud is the privacy and security issues. Various Cryptographic techniques are available to maintain user
privacy and secure data sharing. This paper is mainly focus on several encryption methods to deal with secure data sharing and
accessing in the cloud computing environment.
Keywords - Cloud, data sharing, access control, security, privacy, encryption
I. INTRODUCTION
Cloud computing can be used to enable data
sharing capabilities and this can provide several benefits to
the user and organization when the data shared in cloud.
Since many users can contribute their data to the Cloud,
the time and cost will be less compared to manually
exchange of data.Persons love to share their information
with others such as family, colleagues, friends or the
world. Scholars also get benefit when working on team
projects, as they are able to team up with members and get
work done efficiently. This allows higher productivity
compared to previous methods of frequently sending
updated versions of a document to members of the group
via email attachments.
II. SECURITY REQUIREMENTS
The security requirements for data sharing in
cloud computing system are as follows:
1. Data security
The provider must ensure that their data
outsourced to the cloud is secure and the
provider has to take security measures to
protect their information in cloud.
2. Privacy
The provider must ensure that all critical
data are encrypted and that only authorized users
have access to data in its entirety.
3. Data confidentiality
The cloud users want to make sure that
their data contents are not made available to
unauthorised users. Only authorized users can
access the sensitive data while others should not
access any information of the data in cloud.
4. Fine-grained access control
Data owner can restrict the unauthorized
users to access the data outsource to cloud. The
data owner grants different access rights to a set
of user to access the data, while others not
allowed to access without permissions. The
access permission should be controlled only by
the owner in un-trusted cloud environments.
5. User revocation
When a user gets back the access rights
to the data, it will not allow any other user to
access the data at the given time. The user
revocation must not affect the other authorised
users in the group.
6. Scalability
The number of users is extremely large
in cloud. Also the users join and leave
unpredictably from the cloud, it is important that
the system maintain efficiency as well as
scalability.
III. LITERATURE SURVEY
Some of the encryption techniques are discussed and
summarized as follows.
A. Attribute Based Encryption (ABE):
Saravana Kumar Na et.al [3] proposed an Attribute
Based Encryption(ABE) scheme. Encryption means
conversion of original data into human unreadable form.
Decryption means conversion of the encoded form into
original form. By encrypting the data, the authorized
person only can decode the original data. Thus data
confidentiality is achieved by the encryption. There are
many encryption algorithms today and has its many
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 453
advantages. The attribute based encryption is a verified
algorithm for cloud computing environment. The
restrictions of some of attribute based encryption method
are to be analysed. Encryption in attribute based
encryption is easy, secure and inexpensive compared to
other encryption algorithm. The ABE is secure because
the encrypted data contains the attributes rather than the
data The limitation of the attribute based encryption is
decryption of data is expensive [2]. The attribute based
encryption makes the application to be secure the
performance of the ABE is high compared to other
encryption methods. Thus attribute based encryption is the
solution to all cloud applications in future. The cloud is
moved to next generation computing with critical
applications and real time applications.
B. Key Policy Attribute Based Encryption(KP-ABE):
A. Sahai, and B. Waters et.al [5] proposed a key-
policy attribute-based encryption (KP-ABE) scheme. It is
the revised form of usual model of ABE. In KP-ABE
technique, attribute policies are associated with keys and
data is associated with attributes. The keys are associated
with the policy which is to be satisfied by the attributes
that are associating the decrypted data. Key Policy
Attribute Based Encryption (KP-ABE) scheme is a public
key encryption technique that is considered for one-to-
many communications. Here, the data is associated with
the attributes for which a public key is defined for each
data. Encryptor, that is who encrypts the data, is
associated with the set of attributes to the data or message
by encrypting it with a public key. Users are allotted with
an access tree structure over the data attributes. The nodes
and structure of the access tree are threshold entries. The
leaf nodes are associated with attributes. The user secret
key is defined to reflect the access tree structure. Hence,
the user is able to decrypt the message that is a cipher text
if and only if the data attributes satisfy the access tree
structure. In KP-ABE, a set of attributes is associated
with cipher text and the user’s decryption key is associated
with a monotonic access tree structure [6].
When the attributes associated with the cipher text
satisfy the access tree structure, then the user can decrypt
the cipher text. In cloud computing, an efficient revocation
and an access control mechanism on KP-ABE and a re-
encryption techniques are used together. It enables a data
owner to reduce the server computational overhead. The
KP-ABE scheme provides fine-grained access control.
Each message is encrypted with a symmetric data
encryption key, which is yet again encrypted by a public
key, that is corresponding to a set of attributes in KP-
ABE, which is created corresponding to an access tree
structure. The encrypted data files are stored with the
corresponding attributes and the encrypted DEK. If and
only if the corresponding attributes of a files are stored in
the cloud fulfil the access structure of a user’s key, then
the user is able to decrypt the encrypted data encryption
key [5].
That can be used to decrypt the file or message. KP-ABE
scheme consists of the following four algorithms:
1. Setup: This algorithm takes as input a security
parameter κ and returns the public key PK and a system
master secret key MSK.PK is used by message senders for
encryption. SK is used to generate user secret keys and is
known only to the authority.
2. Encryption: This algorithm takes a message M, the
public key PK, and a set of attributes as input. It outputs
the cipher text E.
3. Key Generation: This algorithm takes as input an
access structure T and the master secret key MSK. It
outputs a secret key SK1 that enables the user to decrypt a
message encrypted under a set of attributes if and only if
matches T.
4. Decryption: It takes as input the user’s secret key SK1
for access structure T and the cipher text E, which was
encrypted under the attribute set. This algorithm outputs
the message M if and only if the attribute set satisfies the
user’s access structure T.
C. Identity-Based Encryption (IBE):
Xinyi Huang et.al [7] proposed an Identity-based
(ID-based) ring signature, which eliminates the process of
certificate verification. By giving forward secure ID-based
ring signature method security level of ring signature is
highly increased. In this encryption method, if the secret
key of any user has been compromised, previous
generated signatures of all is included and the user still
remains valid. If a secret key of single user has been
compromised it is impossible to ask all data owners to re-
authenticate their data. It is particularly important to any
large scale data sharing system and it is very effective and
does not require any pairing operations. The user secret
key is one, while the key update process requires an
exponentiation. This scheme is useful specially to those
require authentication and user privacy.
D. Proxy Re-encryption:
Proxy Re-encryption is one more technique that
supports secure data sharing and confidential data sharing
in the Cloud. Proxy Re-encryption allows a semi-trusted
proxy with a re-encryption key to convert a cipher-text
under the data owner’s public key into another cipher-text
that can be decrypted by other user’s secret key.
A user, Alice, encrypts her data using her public
key. Alice sends the encrypted data to a proxy, when she
wants to share her data with another user, say Bob. The
proxy then converts the data encrypted under Alice’s
public key into data that is encrypted under Bob’s public
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 454
key and sends this to Bob. Bob is able to use his private
key to decrypt the cipher-text and reveal the data.
E. Cipher Text-Policy Attribute Based
Encryption(CP-ABE):
Sphurti Atram,et al [4] introduced the concept of
modified form of Attribute Based Encryption called
Cipher text Policy Attribute Based Encryption. In this
method, attribute policies are connected with data, which
are associated with the keys and only those keys that the
associated attributes satisfy the policy associated with the
data which are able to decrypt the data. CP-ABE works in
the inverse way of KP-ABE. In this method, the cipher
text is associated with an access tree structure and each
user secret key is embedded with a set of attributes. Key
Policy and Cipher text policy based Encryption are the
two different methods of attribute based encryption. The
authority user can run the algorithm Setup and Key
Generation to generate system SK, PK, and user secret
keys. Only authorized users are able to decrypt by calling
the algorithm Decryption. Here, each user is associated
with a set of attributes. The users secret key is generated
based on their attributes. While encrypting a message, the
encrypter specifies the threshold access structure for their
attracted attributes. This message is then encrypted based
on this access structure such that only those whose
attributes satisfy the access structure can decrypt it. With
CP-ABE technique, encrypted data can be kept
confidential and secure against collision attacks [4].
Cipher text policy based Attribute Based Encryption
scheme consists of following four algorithms:
1. Setup: This algorithm takes as input a security
parameter k and returns the public key PK as well as a
system master secret key MSK. PK is used by message
senders for encryption. SK is used to generate user secret
keys and is known only to the authority.
2. Encrypt: This algorithm gets as input the
public parameter PK, a message M, and an access
structure T. It gives output as the cipher text CT.
3. Key-Gen: This algorithm takes as input a set
of attributes associated with the user and the master secret
key MSK. It outputs a secret key SK that enables the user
to decrypt a message encrypted under an access tree
structure T if and only if matches T.
4. Decrypt: This algorithm takes as input the
cipher text CT and a secret key SK for an attributes set. It
gives the message M if and only if satisfies the access
structure associated with the cipher text CT. In CP-ABE
depends how attributes and policy are associated with
cipher texts and users‟ decryption keys. In a CP-ABE
scheme, a cipher text is associated with a monotonic tree
access structure and a user’s decryption key is associated
with set of attributes. In this scheme, the roles of cipher
text and decryption keys are switched as that in KP-ABE.
F. Multi-Party Searchable Encryption(MPSE):
Qiang Tang et.al [8] suggested a searchable
encryption namely multi-party searchable encryption
(MPSE). It enables users to selectively permit each other
to search in their encrypted data. He proposed a new
scheme with provable security. A security model for
MPSE provides stronger security guarantee than that from
[9]. In the construction of MPSE, authorization is
permitted on index level, for each of her indexes. Example
Alice can make a decision whether Bob can search or not
that is if all keywords try by authorized Bob then Alice
supports authorize Bob to look for a subset of keywords in
her indexes and also colluded with Bob can recover the
keyword in all Alice’s search queries. In this method,
Alice can find out a problem of single trapdoor search for
all indexes that have been authorized by her.
IV. CONCLUSIONS
In this paper we have overviewed different
encryption schemes that can be used in cloud computing
systems are flexible, scalable and fine grained access
control. The main issue with data sharing in the cloud is
the privacy and security. Various encryption techniques
are discussed in this paper to support privacy and secure
data sharing such as Data sharing and accessing through
cloud. In ABE scheme, there are both the ‘secret key’ and
‘cipher text’ are associated with a set of attributes. ABE is
again changed into KP-ABE that provides fine grained
access control. In Key policy attribute based encryption,
attribute policies are associated with keys and also the data
is associated with the attributes. The Keys are associated
with the policy that is satisfied by the attributes can
decrypt the data. The CP-ABE scheme differs from KP-
ABE in such a way that in CP-ABE, cipher text is
associated with an access tree structure and each user
secret key is embedded with a set of attributes. Attribute
policies are associated with data and attributes which are
again associated with keys and only those keys that the
associated attributes satisfy the policy associated with the
data are able to decrypt the users data.
REFERENCES
[1] Junzuo Lai,Deng, R.H, Chaowen Guan, Jian Weng,
“Attribute-Based Encryption With Verifiable Outsourced
Decryption “,Information Forensics and Security, IEEE
Transactions on , vol.8, no.8,Aug. 2013, pp.1343,1354.
[2] Mohit Marwaha1, Rajeev Bedi, “Applying Encryption
Algorithm for Data Security and Privacy in Cloud
Computing”, International Journal of Computer Science
Issues, Vol. 10, Issue 1, No 1, January 2013.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 455
[3] Saravana Kumar Na, Rajya Lakshmi G.Vb,
Balamurugan Ba,” Enhanced Attribute Based Encryption
for Cloud Computing,” International Conference on
Information and Communication Technologies, Procedia
Computer Science Vol.46, 2015,
689 – 696.
[4] Sphurti Atram, N. R. Borkar,” A Review Paper on
Attribute-Based Encryption Scheme in Cloud Computing,”
International Journal of Computer Science and Mobile
Computing, Vol. 6, Issue. 5, May 2017,260 – 266.
[5] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-Based Encryption for Fine-grained Access
Control of Encrypted Data,” In Proc. of CCS’06,
Alexandria, Virginia, USA, 2006.
[6] R.Ostrovsky, A. Sahai, and B. Waters, “Attribute-
based encryption with non-monotonic access structures,”
In Proc. of CCS’06, New York, NY, 2007.
[7] Xinyi Huang, Joseph K. Liu, Shaohua Tang, IEEE,
Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou,
“Cost-Effective Authentic and Anonymous Data Sharing
with Forward Security,” IEEE Transactions On
Computers, Vol. 64, No. 4, April 2015.
[8] Xuefeng Liu, Yuqing Zhang, Boyang Wang, and
Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing
for Dynamic Groups in the Cloud,” IEEE Transactions On
Parallel and Distributed Systems, Vol. 24, No. 6, June
2013.
[9] Kaiping Xue and Peilin Hong, “A Dynamic Secure
Group Sharing Framework in Public Cloud Computing,”
Citation information: DOI 10.1109/TCC.2014.2366152,
IEEE Transactions on Cloud Computing.

More Related Content

What's hot

Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud StorageAttribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud StorageIJTET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksIJTET Journal
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...theijes
 

What's hot (18)

Attribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud StorageAttribute Based Encryption with Attribute Hiding in Cloud Storage
Attribute Based Encryption with Attribute Hiding in Cloud Storage
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...Secure and efficient management of confidential data in the decentralized dis...
Secure and efficient management of confidential data in the decentralized dis...
 

Similar to IJSRED-V2I3P52

Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 

Similar to IJSRED-V2I3P52 (19)

Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Paper2
Paper2Paper2
Paper2
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

IJSRED-V2I3P52

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 452 A Survey on Secure Data Accessing and Sharing Using Cryptographic Algorithms in Cloud Computing Environment J. Mala*, Dr.A.N. Jayanthi** , S. Rajesh*** * (Information Technology, Sri Ramakrishna Institute of Technology, Coimbatore) ** (Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology, Coimbatore) *** (Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore) Abstract Data sharing in the cloud is a method that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to cost reduction and the great accessibilities provided by cloud services. Data owner is not able to control over their data, because cloud service provider is a third party user. The major problem with data sharing and accessing in the cloud is the privacy and security issues. Various Cryptographic techniques are available to maintain user privacy and secure data sharing. This paper is mainly focus on several encryption methods to deal with secure data sharing and accessing in the cloud computing environment. Keywords - Cloud, data sharing, access control, security, privacy, encryption I. INTRODUCTION Cloud computing can be used to enable data sharing capabilities and this can provide several benefits to the user and organization when the data shared in cloud. Since many users can contribute their data to the Cloud, the time and cost will be less compared to manually exchange of data.Persons love to share their information with others such as family, colleagues, friends or the world. Scholars also get benefit when working on team projects, as they are able to team up with members and get work done efficiently. This allows higher productivity compared to previous methods of frequently sending updated versions of a document to members of the group via email attachments. II. SECURITY REQUIREMENTS The security requirements for data sharing in cloud computing system are as follows: 1. Data security The provider must ensure that their data outsourced to the cloud is secure and the provider has to take security measures to protect their information in cloud. 2. Privacy The provider must ensure that all critical data are encrypted and that only authorized users have access to data in its entirety. 3. Data confidentiality The cloud users want to make sure that their data contents are not made available to unauthorised users. Only authorized users can access the sensitive data while others should not access any information of the data in cloud. 4. Fine-grained access control Data owner can restrict the unauthorized users to access the data outsource to cloud. The data owner grants different access rights to a set of user to access the data, while others not allowed to access without permissions. The access permission should be controlled only by the owner in un-trusted cloud environments. 5. User revocation When a user gets back the access rights to the data, it will not allow any other user to access the data at the given time. The user revocation must not affect the other authorised users in the group. 6. Scalability The number of users is extremely large in cloud. Also the users join and leave unpredictably from the cloud, it is important that the system maintain efficiency as well as scalability. III. LITERATURE SURVEY Some of the encryption techniques are discussed and summarized as follows. A. Attribute Based Encryption (ABE): Saravana Kumar Na et.al [3] proposed an Attribute Based Encryption(ABE) scheme. Encryption means conversion of original data into human unreadable form. Decryption means conversion of the encoded form into original form. By encrypting the data, the authorized person only can decode the original data. Thus data confidentiality is achieved by the encryption. There are many encryption algorithms today and has its many RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 453 advantages. The attribute based encryption is a verified algorithm for cloud computing environment. The restrictions of some of attribute based encryption method are to be analysed. Encryption in attribute based encryption is easy, secure and inexpensive compared to other encryption algorithm. The ABE is secure because the encrypted data contains the attributes rather than the data The limitation of the attribute based encryption is decryption of data is expensive [2]. The attribute based encryption makes the application to be secure the performance of the ABE is high compared to other encryption methods. Thus attribute based encryption is the solution to all cloud applications in future. The cloud is moved to next generation computing with critical applications and real time applications. B. Key Policy Attribute Based Encryption(KP-ABE): A. Sahai, and B. Waters et.al [5] proposed a key- policy attribute-based encryption (KP-ABE) scheme. It is the revised form of usual model of ABE. In KP-ABE technique, attribute policies are associated with keys and data is associated with attributes. The keys are associated with the policy which is to be satisfied by the attributes that are associating the decrypted data. Key Policy Attribute Based Encryption (KP-ABE) scheme is a public key encryption technique that is considered for one-to- many communications. Here, the data is associated with the attributes for which a public key is defined for each data. Encryptor, that is who encrypts the data, is associated with the set of attributes to the data or message by encrypting it with a public key. Users are allotted with an access tree structure over the data attributes. The nodes and structure of the access tree are threshold entries. The leaf nodes are associated with attributes. The user secret key is defined to reflect the access tree structure. Hence, the user is able to decrypt the message that is a cipher text if and only if the data attributes satisfy the access tree structure. In KP-ABE, a set of attributes is associated with cipher text and the user’s decryption key is associated with a monotonic access tree structure [6]. When the attributes associated with the cipher text satisfy the access tree structure, then the user can decrypt the cipher text. In cloud computing, an efficient revocation and an access control mechanism on KP-ABE and a re- encryption techniques are used together. It enables a data owner to reduce the server computational overhead. The KP-ABE scheme provides fine-grained access control. Each message is encrypted with a symmetric data encryption key, which is yet again encrypted by a public key, that is corresponding to a set of attributes in KP- ABE, which is created corresponding to an access tree structure. The encrypted data files are stored with the corresponding attributes and the encrypted DEK. If and only if the corresponding attributes of a files are stored in the cloud fulfil the access structure of a user’s key, then the user is able to decrypt the encrypted data encryption key [5]. That can be used to decrypt the file or message. KP-ABE scheme consists of the following four algorithms: 1. Setup: This algorithm takes as input a security parameter κ and returns the public key PK and a system master secret key MSK.PK is used by message senders for encryption. SK is used to generate user secret keys and is known only to the authority. 2. Encryption: This algorithm takes a message M, the public key PK, and a set of attributes as input. It outputs the cipher text E. 3. Key Generation: This algorithm takes as input an access structure T and the master secret key MSK. It outputs a secret key SK1 that enables the user to decrypt a message encrypted under a set of attributes if and only if matches T. 4. Decryption: It takes as input the user’s secret key SK1 for access structure T and the cipher text E, which was encrypted under the attribute set. This algorithm outputs the message M if and only if the attribute set satisfies the user’s access structure T. C. Identity-Based Encryption (IBE): Xinyi Huang et.al [7] proposed an Identity-based (ID-based) ring signature, which eliminates the process of certificate verification. By giving forward secure ID-based ring signature method security level of ring signature is highly increased. In this encryption method, if the secret key of any user has been compromised, previous generated signatures of all is included and the user still remains valid. If a secret key of single user has been compromised it is impossible to ask all data owners to re- authenticate their data. It is particularly important to any large scale data sharing system and it is very effective and does not require any pairing operations. The user secret key is one, while the key update process requires an exponentiation. This scheme is useful specially to those require authentication and user privacy. D. Proxy Re-encryption: Proxy Re-encryption is one more technique that supports secure data sharing and confidential data sharing in the Cloud. Proxy Re-encryption allows a semi-trusted proxy with a re-encryption key to convert a cipher-text under the data owner’s public key into another cipher-text that can be decrypted by other user’s secret key. A user, Alice, encrypts her data using her public key. Alice sends the encrypted data to a proxy, when she wants to share her data with another user, say Bob. The proxy then converts the data encrypted under Alice’s public key into data that is encrypted under Bob’s public
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 454 key and sends this to Bob. Bob is able to use his private key to decrypt the cipher-text and reveal the data. E. Cipher Text-Policy Attribute Based Encryption(CP-ABE): Sphurti Atram,et al [4] introduced the concept of modified form of Attribute Based Encryption called Cipher text Policy Attribute Based Encryption. In this method, attribute policies are connected with data, which are associated with the keys and only those keys that the associated attributes satisfy the policy associated with the data which are able to decrypt the data. CP-ABE works in the inverse way of KP-ABE. In this method, the cipher text is associated with an access tree structure and each user secret key is embedded with a set of attributes. Key Policy and Cipher text policy based Encryption are the two different methods of attribute based encryption. The authority user can run the algorithm Setup and Key Generation to generate system SK, PK, and user secret keys. Only authorized users are able to decrypt by calling the algorithm Decryption. Here, each user is associated with a set of attributes. The users secret key is generated based on their attributes. While encrypting a message, the encrypter specifies the threshold access structure for their attracted attributes. This message is then encrypted based on this access structure such that only those whose attributes satisfy the access structure can decrypt it. With CP-ABE technique, encrypted data can be kept confidential and secure against collision attacks [4]. Cipher text policy based Attribute Based Encryption scheme consists of following four algorithms: 1. Setup: This algorithm takes as input a security parameter k and returns the public key PK as well as a system master secret key MSK. PK is used by message senders for encryption. SK is used to generate user secret keys and is known only to the authority. 2. Encrypt: This algorithm gets as input the public parameter PK, a message M, and an access structure T. It gives output as the cipher text CT. 3. Key-Gen: This algorithm takes as input a set of attributes associated with the user and the master secret key MSK. It outputs a secret key SK that enables the user to decrypt a message encrypted under an access tree structure T if and only if matches T. 4. Decrypt: This algorithm takes as input the cipher text CT and a secret key SK for an attributes set. It gives the message M if and only if satisfies the access structure associated with the cipher text CT. In CP-ABE depends how attributes and policy are associated with cipher texts and users‟ decryption keys. In a CP-ABE scheme, a cipher text is associated with a monotonic tree access structure and a user’s decryption key is associated with set of attributes. In this scheme, the roles of cipher text and decryption keys are switched as that in KP-ABE. F. Multi-Party Searchable Encryption(MPSE): Qiang Tang et.al [8] suggested a searchable encryption namely multi-party searchable encryption (MPSE). It enables users to selectively permit each other to search in their encrypted data. He proposed a new scheme with provable security. A security model for MPSE provides stronger security guarantee than that from [9]. In the construction of MPSE, authorization is permitted on index level, for each of her indexes. Example Alice can make a decision whether Bob can search or not that is if all keywords try by authorized Bob then Alice supports authorize Bob to look for a subset of keywords in her indexes and also colluded with Bob can recover the keyword in all Alice’s search queries. In this method, Alice can find out a problem of single trapdoor search for all indexes that have been authorized by her. IV. CONCLUSIONS In this paper we have overviewed different encryption schemes that can be used in cloud computing systems are flexible, scalable and fine grained access control. The main issue with data sharing in the cloud is the privacy and security. Various encryption techniques are discussed in this paper to support privacy and secure data sharing such as Data sharing and accessing through cloud. In ABE scheme, there are both the ‘secret key’ and ‘cipher text’ are associated with a set of attributes. ABE is again changed into KP-ABE that provides fine grained access control. In Key policy attribute based encryption, attribute policies are associated with keys and also the data is associated with the attributes. The Keys are associated with the policy that is satisfied by the attributes can decrypt the data. The CP-ABE scheme differs from KP- ABE in such a way that in CP-ABE, cipher text is associated with an access tree structure and each user secret key is embedded with a set of attributes. Attribute policies are associated with data and attributes which are again associated with keys and only those keys that the associated attributes satisfy the policy associated with the data are able to decrypt the users data. REFERENCES [1] Junzuo Lai,Deng, R.H, Chaowen Guan, Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption “,Information Forensics and Security, IEEE Transactions on , vol.8, no.8,Aug. 2013, pp.1343,1354. [2] Mohit Marwaha1, Rajeev Bedi, “Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing”, International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 455 [3] Saravana Kumar Na, Rajya Lakshmi G.Vb, Balamurugan Ba,” Enhanced Attribute Based Encryption for Cloud Computing,” International Conference on Information and Communication Technologies, Procedia Computer Science Vol.46, 2015, 689 – 696. [4] Sphurti Atram, N. R. Borkar,” A Review Paper on Attribute-Based Encryption Scheme in Cloud Computing,” International Journal of Computer Science and Mobile Computing, Vol. 6, Issue. 5, May 2017,260 – 266. [5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data,” In Proc. of CCS’06, Alexandria, Virginia, USA, 2006. [6] R.Ostrovsky, A. Sahai, and B. Waters, “Attribute- based encryption with non-monotonic access structures,” In Proc. of CCS’06, New York, NY, 2007. [7] Xinyi Huang, Joseph K. Liu, Shaohua Tang, IEEE, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security,” IEEE Transactions On Computers, Vol. 64, No. 4, April 2015. [8] Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions On Parallel and Distributed Systems, Vol. 24, No. 6, June 2013. [9] Kaiping Xue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” Citation information: DOI 10.1109/TCC.2014.2366152, IEEE Transactions on Cloud Computing.