SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1219
A Novel Approach for Appreciable Group Data Allocation System with
Key Agreement in Cloud Computing
Gururaj. Nase1, Shilpa2
1Asst. Professor,Department of Computer Science and Engineering, Lingaraj Appa Engineering College, Bidar,
Karnataka (India)
24th Semester M.Tech Student, Department of Computer Science and Engineering, Lingaraj Appa Engineering
College, Bidar, Karnataka (India)
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Social occasion data sharing in cloud
conditions has transformed into a fascinating issue with
regards to late decades. Through the omnipresence of
disseminated register, how to achieve protected just as
capable data sharing in cloud conditions is a sincere issue to
be comprehended. Besides, how set out toward achieve
together mystery just as terribleness is furthermore a test in
cloud expert data dispersion. This project centers around
empowering information sharing and capacity for a similar
gathering in the cloud through elevated safety as well as
proficiency in a mysterious way. With utilizing the key
understanding and the gathering mark, a narrative
recognizable gathering information distribution plan is
planned to help mysterious different clients in open mists.
From one perspective, bunch individuals can discuss secretly
concerning the gathering mark, and the genuine characters
of individuals can be followed if essential. Then again, a
typical gathering key is determined dependent on the key
consent to empower bunch individuals to split as well as
hoard their information safely. Memo so as to a symmetric
adjusted deficient square structure is used for key age,
which generously diminishes the weight on individuals to
infer a typical gathering key. Both hypothetical and
exploratory investigations show so as to the planned plan is
safe as well as proficient pro gathering information
partaking in distributed compute.
KeyWords: GroupData, Privacy, Security,
KeyAgreement, Storage.
1. INTRODUCTION
Differentiated and the customary information sharing and
correspondence advancement, dispersed processing has
pulled in light of an authentic worry for most researchers
because of its low essentialness use and resource sharing
traits. Distributed computing can not just furnish clients
with evidently boundless figuring assets yet in addition
furnish clients with clearly boundless capacity assets
.Cloud stockpiling is a be noticeable among the mainly
significant administration in distributed computing Which
empower the interconnection of a wide range of electronic
items. Additionally, different types of information data can
uninhibitedly stream as for the distributed storage
administration, for example, interpersonal organizations,
video altering and home systems. Be that as it may, little
consideration has been given to aggregate information
partaking in the cloud, which alludes to the circumstance
where numerous clients need to accomplish data
partaking in a gathering way for helpful purposes .Group
information sharing has numerous pragmatic applications,
for example, electronic wellbeing systems, remote body
region systems, as well as electronic writing in libraries.
There are two different way to split information in
distributed storage space. The initial is a one-to-many
example, which alludes to situation wherever one
customer approves entrée to his/her information for some
customers. The next is a many-to-many example, which
alludes to a circumstance where numerous customers in a
similar gathering approve access to their information for
some customers in the meantime.Think about the
accompanying genuine situation: in an exploration bunch
at a logical research organization, every part needs to
impart their outcomes and revelations to their colleagues.
In this case, individuals on a similar group can get to the
majority of the group's outcomes (e.g., imaginative
thoughts, look into results, and trial information). Be that
as it may, the support and difficulties brought about by the
neighborhood stockpiling increment the trouble and
remaining burden of data partaking in the gathering. Re-
appropriating information or tedious computational
outstanding burdens to the cloud comprehends the issues
of upkeep and difficulties brought about by neighborhood
stockpiling and lessens the excess of information data,
which decreases the weight on ventures, scholarly
foundations or even people. Notwithstanding, because of
the lack of quality of the cloud, the re-appropriated
information are inclined to be spilled and altered. By and
large, clients have just generally short manage in the cloud
administration as well as can't ensure the safety of the put
away information. What's more, now and again, the client
would like to secretly accomplish information partaking in
the cloud .we will probably accomplish unknown
information sharing under a haze registering condition in
a gathering way with high security and productivity. To
accomplish this objective, the accompanying testing issues
ought to be thought about.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1220
1.1 RELATED WORK
Distributed storage inspecting is seen as a significant
administration to corroborate the trustworthiness of the
in sequence in open cloud. Current reviewing conventions
are altogether founded on the supposition that the
customer's mystery key for inspecting is totally secure. Be
that as it may, such supposition may not generally be held,
because of the potentially frail feeling that all is well with
the world and additionally low security settings at the
customer. On the off chance that such a mystery key for
examining is uncovered, the majority of the current
evaluating conventions would unavoidably end up unfit to
work. In this paper, we center around this new part of
distributed storage examining. We examine how to reduce
the harm of the customer's input introduction in
distributed storeroom evaluating, and give the main down
to earth answer for this new issue setting. The security
verification and the exhibition investigation reveal so as to
our planned convention is safe as well as productive. The
design of evident record (VDB) empower an benefit
obliged client to safely re-appropriate an enormous
database to a believed server with the goal that it could
later on get well a record evidence as well as update it via
doling out a new worth. As well, any endeavor via the
server to muddle by the in sequence will be identified by
the customer. All around as of late, Catalano and Fiore
proposed an exquisite system to assemble proficient VDB
that supports open undeniable nature as of a new basic
name vector job. In this manuscript, we carry up Catalano-
Fiore's VDB system as of vector blame is helpless beside
the purported onward automatic update (FAU) stabbing.
We demonstrate that our development can accomplish the
ideal security properties. Cryptography-based security
saving information mining has been proposed to ensure
the protection of taking part gatherings' information for
this procedure. In this paper, we address the test of
redistributing ID3 choice tree calculation in the vindictive
model. Especially, to safely store and process private
information, the two-member symmetric homomorphic
encryption supporting expansion and augmentation is
proposed. To keep from pernicious practices of distributed
computing server, the safe jumbled circuits are embraced
to propose the security protecting weight normal
convention. Security and execution are examined. Data
distribution transforms keen on an uncommonly engaging
organization given via conveyed registering stages since of
its expediency plus cutback. As a possible method pro
recognizing well grained information allocation, feature
base encryption (ABE) have tired wide contemplations.
Regardless, mainly of the present ABE courses of action
experience the evil impacts of the hindrances of elevated
figuring slide as well as feeble information safety, which
has genuinely discouraged resource constrained PDAs to
change the organization. The issue of in the meantime
achieving fine-grained ness, high competence on the
information proprietor 's side, and standard data grouping
of cloud data partaking as a general rule still remains
dubious. This paper watches out for this troublesome
issue by proposing another trademark based data
distribution arrangement sensible for resource obliged
versatile customers in appropriated registering. The
proposed arrangement murders a larger part of the count
task via counting arrangement unbolt parameter
additional than moving midway encryption estimation
offline. The proposed plan is exposed safe next to
adaptively chosen ciphertext ambushes, which is
commonly seen as a normal safety supposed. Wide
implementation assessment demonstrate that the
proposed arrangement is safe as well as profitable.
Distributed computing is developing as the cutting edge IT
engineering. Nonetheless, distributed computing
additionally raises safety as well as protection worries as
the clients contain no bodily authority over the re-
appropriated information. This paper centers around
reasonably recovering scrambled private medicinal
records redistributed to distant untrusted cloud servers
on account of restorative mishaps and questions. We will
likely empower a free board of trustees to reasonably
recoup the first private medicinal records so restorative
examination can be done in a persuading way. We
accomplish this objective with a reasonable remote
recovery (FRR) model in which either t examination board
of trustees individuals helpfully recover the first
therapeutic information or none of them can get any data
on the restorative records. We understand the first FRR
conspire by abusing reasonable multi-part key trade and
homomorphic secretly unquestionable labels. In light of
the normal computational Diffie–Hellman (CDH)
suspicion, our plan is provably safe in the irregular
prophet replica (ROM). An itemized presentation
investigation and test results demonstrate that our plan is
proficient as far as correspondence and calculation.
1.2 SYSTEM DESIGN
Figure1: 3-Tier Architecture diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1221
Beneath design outline speak toward typically torrent of
solicitation as of the patrons to file during servers. In this
circumstances by and large structure is structured in three
level separately utilize three layer call foreword layer,
commerce coating, information connection coating. This
venture was created utilizing 3 stage plan.The three-level
programming engineering (a three layer design) rose
during the 1990s to beat the limits of the two-level
engineering. The third stage (center level server) is amid
the UI (customer) as well as the in order the executives
(server) parts. This center level give procedure the
executives anywhere commerce rationale as well as
standards are execute as well as can oblige many
consumers (when contrasted with just 100 clients with
the two level engineering) via charitable capacity, for
instance, inside layer, function implementation, as well as
record organizing.
2. IMPLEMENTATION DETAILES
1MEMBER
2CLOUD
3GROUP MANAGER
1MEMBER
The made out of a progression of clients dependent on the
SBIBD correspondence replica. In our plan, individuals be
individuals through similar interests (e.g., bidder,
specialists, as well as agents) as well as they need to split
information in the cloud. The mainly stressing issue while
clients store information in the cloud server is the secrecy
of the redistributed information. In our framework, clients
of a similar gathering behavior a input understanding.
2CLOUD
Furnishes clients with apparently boundless storage
services. Notwithstanding giving productive and
convenient storage administrations to clients, the cloud
can likewise give data sharing administrations. Be that as
it may, the cloud has the normal for fair yet inquisitive. As
it were, the cloud will not intentionally erase or adjust the
transferred information of user, except it resolve be
interested to comprehend the substance of stored data as
well as the client's character. The obscure is a semi-
trusted partyin our plan.
3GROUP MANAGER
Gathering supervisor is in charge of producing framework
parameters, overseeing bunch individuals (i.e.,
transferring members encrypted information, approving
gathering individuals, uncovering the real character of a
part) and for the adaptation to internal failure detection.
The bunch chief in our plan is a completely confided in
third party to both the cloud and gathering individuals.
Initially, clients with a similar intrigue register at the
group manager in order to share information in the cloud.
Moreover, user revocation is likewise performed by the
gathering chief. Secondly, all individuals from the
gathering dependent on the SBIBD arrangement jointly
negotiate a typical assembly input which preserve be
utilized to encryptor unscramble the redistributed
information. At last, when a question occurs, the bunch
chief can uncover the genuine character of the group part.
Note so as to in our framework replica, information
uploadingand admittance direct are perform via the
gathering director.
2.2. Experimental Results
Fig 2:Home Page
Fig 3 Member Registration
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1222
Fig 4: Verify Group Key
Fig 5: File Upload
3. CONCLUSION
In this manuscript, we there a safe as well as shortcoming
broadminded input understanding pro gathering
information partaking in a distributed cargo space
conspire. In light of the SBIBD and gathering mark
procedure, the proposed methodology can produce a
typical meeting key effectively, which preserve be utilized
to ensure the safety of the re-appropriated information as
well as bolster safe gathering information partaking in the
cloud in the meantime. Note that calculations to develop
the SBIBD as well as numerical portrayals of the SBIBD are
exhibited in this manuscript. In addition, confirmation
administrations and productive access control are
accomplished as for the gathering mark system.
Furthermore, our plan can bolster the recognizability of
client personality in a mysterious situation. Regarding
dynamic changes of the gathering part, exploiting the key
understanding and effective entrée manage, the
computational unpredictability as well as correspondence
intricacy pro refreshing the regular meeting key and the
encoded information are generally low.
REFERENCES
[1] J. Yu, K. Ren, C. Wang,“enable cloud cargo space audit
through key - contact confrontation.
[2] X. Chen, J. Li, X. Huang, J. Ma “New openly
demonstrable database through competent update.
[3] X. Chen, J. Li, J. Ma, Q. Tang “novel algorithm pro secure
outsourcing of modular exponentiations.
[4] J. Li, Y. Zhang, X. Chen “protected attribute - base data
sharing pro resource - limited user in cloud computing.
[5] J. Shen, T. Zhou, D. He, Y. Zhang, “chunk design - base
input accord pro cluster information distribution in cloud
computing.
.

More Related Content

What's hot

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud1crore projects
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 

What's hot (19)

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
234 237
234 237234 237
234 237
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 

Similar to IRJET- A Novel Approach for Appreciable Group Data Allocation System with Key Agreement in Cloud Computing

A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSIRJET Journal
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET Journal
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATAIRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET Journal
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...IRJET Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 

Similar to IRJET- A Novel Approach for Appreciable Group Data Allocation System with Key Agreement in Cloud Computing (20)

A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
 
50120140507005
5012014050700550120140507005
50120140507005
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

IRJET- A Novel Approach for Appreciable Group Data Allocation System with Key Agreement in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1219 A Novel Approach for Appreciable Group Data Allocation System with Key Agreement in Cloud Computing Gururaj. Nase1, Shilpa2 1Asst. Professor,Department of Computer Science and Engineering, Lingaraj Appa Engineering College, Bidar, Karnataka (India) 24th Semester M.Tech Student, Department of Computer Science and Engineering, Lingaraj Appa Engineering College, Bidar, Karnataka (India) ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Social occasion data sharing in cloud conditions has transformed into a fascinating issue with regards to late decades. Through the omnipresence of disseminated register, how to achieve protected just as capable data sharing in cloud conditions is a sincere issue to be comprehended. Besides, how set out toward achieve together mystery just as terribleness is furthermore a test in cloud expert data dispersion. This project centers around empowering information sharing and capacity for a similar gathering in the cloud through elevated safety as well as proficiency in a mysterious way. With utilizing the key understanding and the gathering mark, a narrative recognizable gathering information distribution plan is planned to help mysterious different clients in open mists. From one perspective, bunch individuals can discuss secretly concerning the gathering mark, and the genuine characters of individuals can be followed if essential. Then again, a typical gathering key is determined dependent on the key consent to empower bunch individuals to split as well as hoard their information safely. Memo so as to a symmetric adjusted deficient square structure is used for key age, which generously diminishes the weight on individuals to infer a typical gathering key. Both hypothetical and exploratory investigations show so as to the planned plan is safe as well as proficient pro gathering information partaking in distributed compute. KeyWords: GroupData, Privacy, Security, KeyAgreement, Storage. 1. INTRODUCTION Differentiated and the customary information sharing and correspondence advancement, dispersed processing has pulled in light of an authentic worry for most researchers because of its low essentialness use and resource sharing traits. Distributed computing can not just furnish clients with evidently boundless figuring assets yet in addition furnish clients with clearly boundless capacity assets .Cloud stockpiling is a be noticeable among the mainly significant administration in distributed computing Which empower the interconnection of a wide range of electronic items. Additionally, different types of information data can uninhibitedly stream as for the distributed storage administration, for example, interpersonal organizations, video altering and home systems. Be that as it may, little consideration has been given to aggregate information partaking in the cloud, which alludes to the circumstance where numerous clients need to accomplish data partaking in a gathering way for helpful purposes .Group information sharing has numerous pragmatic applications, for example, electronic wellbeing systems, remote body region systems, as well as electronic writing in libraries. There are two different way to split information in distributed storage space. The initial is a one-to-many example, which alludes to situation wherever one customer approves entrée to his/her information for some customers. The next is a many-to-many example, which alludes to a circumstance where numerous customers in a similar gathering approve access to their information for some customers in the meantime.Think about the accompanying genuine situation: in an exploration bunch at a logical research organization, every part needs to impart their outcomes and revelations to their colleagues. In this case, individuals on a similar group can get to the majority of the group's outcomes (e.g., imaginative thoughts, look into results, and trial information). Be that as it may, the support and difficulties brought about by the neighborhood stockpiling increment the trouble and remaining burden of data partaking in the gathering. Re- appropriating information or tedious computational outstanding burdens to the cloud comprehends the issues of upkeep and difficulties brought about by neighborhood stockpiling and lessens the excess of information data, which decreases the weight on ventures, scholarly foundations or even people. Notwithstanding, because of the lack of quality of the cloud, the re-appropriated information are inclined to be spilled and altered. By and large, clients have just generally short manage in the cloud administration as well as can't ensure the safety of the put away information. What's more, now and again, the client would like to secretly accomplish information partaking in the cloud .we will probably accomplish unknown information sharing under a haze registering condition in a gathering way with high security and productivity. To accomplish this objective, the accompanying testing issues ought to be thought about.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1220 1.1 RELATED WORK Distributed storage inspecting is seen as a significant administration to corroborate the trustworthiness of the in sequence in open cloud. Current reviewing conventions are altogether founded on the supposition that the customer's mystery key for inspecting is totally secure. Be that as it may, such supposition may not generally be held, because of the potentially frail feeling that all is well with the world and additionally low security settings at the customer. On the off chance that such a mystery key for examining is uncovered, the majority of the current evaluating conventions would unavoidably end up unfit to work. In this paper, we center around this new part of distributed storage examining. We examine how to reduce the harm of the customer's input introduction in distributed storeroom evaluating, and give the main down to earth answer for this new issue setting. The security verification and the exhibition investigation reveal so as to our planned convention is safe as well as productive. The design of evident record (VDB) empower an benefit obliged client to safely re-appropriate an enormous database to a believed server with the goal that it could later on get well a record evidence as well as update it via doling out a new worth. As well, any endeavor via the server to muddle by the in sequence will be identified by the customer. All around as of late, Catalano and Fiore proposed an exquisite system to assemble proficient VDB that supports open undeniable nature as of a new basic name vector job. In this manuscript, we carry up Catalano- Fiore's VDB system as of vector blame is helpless beside the purported onward automatic update (FAU) stabbing. We demonstrate that our development can accomplish the ideal security properties. Cryptography-based security saving information mining has been proposed to ensure the protection of taking part gatherings' information for this procedure. In this paper, we address the test of redistributing ID3 choice tree calculation in the vindictive model. Especially, to safely store and process private information, the two-member symmetric homomorphic encryption supporting expansion and augmentation is proposed. To keep from pernicious practices of distributed computing server, the safe jumbled circuits are embraced to propose the security protecting weight normal convention. Security and execution are examined. Data distribution transforms keen on an uncommonly engaging organization given via conveyed registering stages since of its expediency plus cutback. As a possible method pro recognizing well grained information allocation, feature base encryption (ABE) have tired wide contemplations. Regardless, mainly of the present ABE courses of action experience the evil impacts of the hindrances of elevated figuring slide as well as feeble information safety, which has genuinely discouraged resource constrained PDAs to change the organization. The issue of in the meantime achieving fine-grained ness, high competence on the information proprietor 's side, and standard data grouping of cloud data partaking as a general rule still remains dubious. This paper watches out for this troublesome issue by proposing another trademark based data distribution arrangement sensible for resource obliged versatile customers in appropriated registering. The proposed arrangement murders a larger part of the count task via counting arrangement unbolt parameter additional than moving midway encryption estimation offline. The proposed plan is exposed safe next to adaptively chosen ciphertext ambushes, which is commonly seen as a normal safety supposed. Wide implementation assessment demonstrate that the proposed arrangement is safe as well as profitable. Distributed computing is developing as the cutting edge IT engineering. Nonetheless, distributed computing additionally raises safety as well as protection worries as the clients contain no bodily authority over the re- appropriated information. This paper centers around reasonably recovering scrambled private medicinal records redistributed to distant untrusted cloud servers on account of restorative mishaps and questions. We will likely empower a free board of trustees to reasonably recoup the first private medicinal records so restorative examination can be done in a persuading way. We accomplish this objective with a reasonable remote recovery (FRR) model in which either t examination board of trustees individuals helpfully recover the first therapeutic information or none of them can get any data on the restorative records. We understand the first FRR conspire by abusing reasonable multi-part key trade and homomorphic secretly unquestionable labels. In light of the normal computational Diffie–Hellman (CDH) suspicion, our plan is provably safe in the irregular prophet replica (ROM). An itemized presentation investigation and test results demonstrate that our plan is proficient as far as correspondence and calculation. 1.2 SYSTEM DESIGN Figure1: 3-Tier Architecture diagram
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1221 Beneath design outline speak toward typically torrent of solicitation as of the patrons to file during servers. In this circumstances by and large structure is structured in three level separately utilize three layer call foreword layer, commerce coating, information connection coating. This venture was created utilizing 3 stage plan.The three-level programming engineering (a three layer design) rose during the 1990s to beat the limits of the two-level engineering. The third stage (center level server) is amid the UI (customer) as well as the in order the executives (server) parts. This center level give procedure the executives anywhere commerce rationale as well as standards are execute as well as can oblige many consumers (when contrasted with just 100 clients with the two level engineering) via charitable capacity, for instance, inside layer, function implementation, as well as record organizing. 2. IMPLEMENTATION DETAILES 1MEMBER 2CLOUD 3GROUP MANAGER 1MEMBER The made out of a progression of clients dependent on the SBIBD correspondence replica. In our plan, individuals be individuals through similar interests (e.g., bidder, specialists, as well as agents) as well as they need to split information in the cloud. The mainly stressing issue while clients store information in the cloud server is the secrecy of the redistributed information. In our framework, clients of a similar gathering behavior a input understanding. 2CLOUD Furnishes clients with apparently boundless storage services. Notwithstanding giving productive and convenient storage administrations to clients, the cloud can likewise give data sharing administrations. Be that as it may, the cloud has the normal for fair yet inquisitive. As it were, the cloud will not intentionally erase or adjust the transferred information of user, except it resolve be interested to comprehend the substance of stored data as well as the client's character. The obscure is a semi- trusted partyin our plan. 3GROUP MANAGER Gathering supervisor is in charge of producing framework parameters, overseeing bunch individuals (i.e., transferring members encrypted information, approving gathering individuals, uncovering the real character of a part) and for the adaptation to internal failure detection. The bunch chief in our plan is a completely confided in third party to both the cloud and gathering individuals. Initially, clients with a similar intrigue register at the group manager in order to share information in the cloud. Moreover, user revocation is likewise performed by the gathering chief. Secondly, all individuals from the gathering dependent on the SBIBD arrangement jointly negotiate a typical assembly input which preserve be utilized to encryptor unscramble the redistributed information. At last, when a question occurs, the bunch chief can uncover the genuine character of the group part. Note so as to in our framework replica, information uploadingand admittance direct are perform via the gathering director. 2.2. Experimental Results Fig 2:Home Page Fig 3 Member Registration
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1222 Fig 4: Verify Group Key Fig 5: File Upload 3. CONCLUSION In this manuscript, we there a safe as well as shortcoming broadminded input understanding pro gathering information partaking in a distributed cargo space conspire. In light of the SBIBD and gathering mark procedure, the proposed methodology can produce a typical meeting key effectively, which preserve be utilized to ensure the safety of the re-appropriated information as well as bolster safe gathering information partaking in the cloud in the meantime. Note that calculations to develop the SBIBD as well as numerical portrayals of the SBIBD are exhibited in this manuscript. In addition, confirmation administrations and productive access control are accomplished as for the gathering mark system. Furthermore, our plan can bolster the recognizability of client personality in a mysterious situation. Regarding dynamic changes of the gathering part, exploiting the key understanding and effective entrée manage, the computational unpredictability as well as correspondence intricacy pro refreshing the regular meeting key and the encoded information are generally low. REFERENCES [1] J. Yu, K. Ren, C. Wang,“enable cloud cargo space audit through key - contact confrontation. [2] X. Chen, J. Li, X. Huang, J. Ma “New openly demonstrable database through competent update. [3] X. Chen, J. Li, J. Ma, Q. Tang “novel algorithm pro secure outsourcing of modular exponentiations. [4] J. Li, Y. Zhang, X. Chen “protected attribute - base data sharing pro resource - limited user in cloud computing. [5] J. Shen, T. Zhou, D. He, Y. Zhang, “chunk design - base input accord pro cluster information distribution in cloud computing. .