SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET)
5041
Secure Data Sharing in Cloud Computing using Revocable Storage
Identity Based Encryption
G.Durvasi1, O.Sumanjali2, T.Kavyasri3, V. Swathisri4
1
AssistantProfessor,DepartmentofInformationTechnology,AndhraLoyolaInstituteof
Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India
2
UnderGraduate Student,DepartmentofInformationTechnology,AndhraLoyolaInstituteof
Engineering and Technology, Vijayawada-08, Andhra Pradesh,India
3
Under Graduate Student, Department of Information Technology, Andhra Loyola Institute of
Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India
4
Under Graduate Student, Department of Information Technology, Andhra Loyola Institute of
Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing gives a flexible and
helpful path for information sharing, which brings
different benefits for both the general public and
people. However, there exists a characteristic
opposition for clients to straightforwardly re-
appropriate the common information to the cloud
server since the information regularly contain
important data. Along these lines, it is important to put
cryptographically improved access control on the
mutual information. Character based encryption is a
promising cryptographical crude to fabricate a useful
information sharing framework. Nonetheless, get to
control isn't static. That is, the point at which some
client's approval is terminated, there ought to be a
component that can evacuate him/her from the
framework. Therefore, the renounced client can't get
to both the beforehand and along these lines shared
information. To this end, we propose a thought called
revocable storage identity-based encryption (RS-IBE),
which can give the forward/in reverse security of
ciphertext by presenting the functionalities of client
repudiation and ciphertext update at the same time.
Besides, we present a solid development of RS-IBE, and
demonstrate its security in the defined security model.
The presentation examinations show that the proposed
RS-IBE plot has points of interest regarding usefulness
and efficiency, and along these lines is plausible for a
commonsense and financially savvy information
sharing framework.
Key Words — Cloud computing, information sharing,
renouncement, Identity-based encryption, ciphertext
update, decoding key introduction.
1. INTRODUCTION
Cloud computing is the utilization of processing
assets (equipment and programming) that are
conveyed as a help over a system (commonly the
Internet). The name originates from the normal
utilization of a cloud-formed image as a reflection
for the mind-boggling foundation it contains in
framework outlines. Cloud computing endows
remote administrations with a client's information,
programming and calculation. Cloud computing
comprises of equipment and programming assets
made accessible on the Internet as oversaw outsider
administrations. These administrations normally
give access to cutting edge programming
applications and very good quality systems of server
PCs.
1.1 How Cloud Computing Works?
The objective of cloud computing is to apply
conventional supercomputing, or elite registering
power, ordinarily utilized by military and research
offices, to perform many trillions of calculations for
every second, in purchaser arranged applications, for
example, budgetary portfolios, to convey customized
data, to give information stock piling or to control
huge, vivid PC games.
The cloud computing utilizes systems of
enormous gatherings of servers regularly running
ease customer PC innovation with particular
associations with spread information preparing
errands across them.
International Research Journal of Engineering and Technology (IRJET)
1.2 Qualities and Services Models
The striking attributes of cloud computing
dependent on the definitions gave by the National
Institute of Standards and Terminology (NIST) are
sketched out beneath:
• On request self-administration: A shopper can
singularly arrangement registering capacities, for
example, servertime and system stockpiling, varying
consequently without requiring human cooperation
with each serviceprovider.
• Broad arrange get to: Capabilities are accessible
over the system and gotten to through standard
components that advance use by heterogeneous
flimsy or thick customer stages (e.g., cell phones,
PCs, and PDAs).
• Resource pooling: The supplier's registering
assets are pooled to serve various buyers utilizing a
multi-inhabitant model, with various physical and
virtual assets progressively doled out and reassigned
by purchaser request. There is a feeling of area
autonomy in that the client for the most part has no
control or information over the specific area of the
gave assets however might have the option to
determine area at a more elevated level of reflection
(e.g., nation, state, or server farm). Instances of
assets incorporate capacity, preparing, memory,
arrange data transfer capacity, and virtual machines.
• Rapid flexibility: Capabilities can be quickly and
flexibly provisioned, at times consequently, to
rapidly scale out and quickly discharged to rapidly
scale in. To the buyer, the abilities accessible for
provisioning frequently have all the earmarks of
being boundless and can be bought in any amount
whenever.
1.3 Services Models
Cloud computing involves three diverse
assistance models, to be specific Infrastructure-as-a-
Service (IaaS), Platform-as-a-Service (PaaS), and
Software-as-a-Service (SaaS). The three assistance
models or layer are finished by an end client layer
that epitomizes the end client point of view on cloud
administrations. The model is appeared in figure
underneath. On the off chance that a cloud clientgets
to administrations on the framework layer, for
example, she can run her own applications on the
assets of a cloud foundation and stay liable for the
help, upkeep, and security of these applications
herself.
1.4 Advantages of cloud computing
1.Achieve economies of scale – increment volume
yield or profitability with less individuals. Your
expense per unit, venture or item plunges.
2.Reduce spending on innovation framework. Keep
up simple access to your data with negligible
forthright spending. Pay more only as costs arise
(week after week, quarterly or yearly), in view of
interest.
3.Globalize your workforce for as little as possible.
Individuals worldwide can get to the cloud, if they
have an Internet association.
4.Streamline procedures. Complete more work in
less time with less individuals.
5.Reduce capital expenses. There's no compelling
reason to spend huge cash on equipment,
programming orpermitting charges.
6.Improve openness. You approach whenever,
anyplace, making your life so a lot simpler!
7.Monitor ventures all the more adequately. Remain
inside spending plan and in front of finish process
durations.
8.Less faculty preparing is required. It takes less
individuals to accomplish more work on a cloud,
with an insignificant expectation to absorb
information on equipment and programming issues.
9.Minimize permitting new programming. Extend
and develop without the need to purchase costly
programming licenses or projects.
10. Improve adaptability. You can alter course
without genuine "individuals" or "budgetary" issues
in question.
1.5 Favorable circumstances
1. Price: Pay for just the assets utilized.
2. Security: Cloud occurrences are detached in the
system from different examples for improved
security.
3. Performance: Instances can be included right
away for improved execution. Customers approach
theall-outassets of the Cloud's center equipment.
4. Scalability: Auto-convey cloud occasions when
required.
5.Uptime: Uses different servers for most extreme
redundancies. If there should be an occurrence of
server disappointment, examples can be naturally
madeonanother server.
International Research Journal of Engineering and Technology (IRJET)
2. SYSTEM DESIGN
3. IMPLEMENTATION
3.1 MODULES:
 System Construction Module
 Data Provider
 Cloud User
 Key Authority (Auditor)
3.2 MODULES DESCSRIPTION
 SystemConstructionModule:
In the first module, we develop the proposed
system with the required entities for theevaluation
of the proposed model. The data provider (e.g.,
David) first decides the users (e.g., Alice and Bob)
who can share the data. Then, David encrypts the
data under the identities Alice and Bob, and
uploads the ciphertext of the shared data to the
cloud server. When either Alice or Bob wants to get
the shared data,she or he can download and decrypt
the corresponding ciphertext. However, for an
unauthorized user and the cloud server, the
plaintext of the shared data is not available.
 Data Provider:
In this module, we develop the Data Provider
module. The data provider module is developedsuch
that the new users will Signup initially and then
Login for authentication. The data provider module
provides the option of uploading the file to the Cloud
Server. The process of File Uploading to the cloud
Server is undergone with Identity-based encryption
format. Data Provider will check the progress status
of the file upload by him/her. Data Provider
provided with the features of Revocation and
Ciphertext update the file. Once after completion of
the process, the Data Provider logouts thesession.
 Cloud User:
In this module, we develop the Cloud User
module.TheCloud usermodule is developedsuchthat
the new users will Signup initially and then Login for
authentication. The Cloud user is provided with the
option of file search. Then cloud user feature is
added up for send the Request to Auditor for the File
access. After getting decrypt key from the Auditor,
he/she can access to the File. The cloud user is also
enabled to download the File.
 Key Authority (Auditor):
Auditor Will Login on the Auditor's page. He/she
will check the pending requests of any of the above
person. After accepting the request from the above
person, he/she will generate master key for encrypt
and Secret key for decrypt. After the complete
process, the Auditor logout the session.
4. CONCLUSION
Cloud computing brings great convenience
for people. Particularly, it perfectly matches the
increased need of sharing data over the Internet. In
this paper, to build a cost- effective and secure data
sharing system in cloud computing, we proposed a
notion called RS-IBE, which supports identity
revocation and ciphertext update simultaneously
such that a revoked user is prevented fromaccessing
previously shared data, as well as subsequently
shared data. Furthermore, a concrete construction of
RS-IBE is presented. The proposed RS-IBE scheme is
proved adaptive-secure in the standard model,
under the decisional ℓ-DBHE assumption. The
comparison results demonstrate that our scheme
has advantages in terms of efficiency and
functionality, and thus is more feasible for practical
applications.
REFERENCES
[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres,
and M. Lindner “A break in the clouds:
towards a cloud definition”
[2] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W.
Lou, “Privacy preserving public auditing for
secure cloud storage”.
[3] K. Yang and X. Jia “An efficient and secure
dynamic auditing protocol for data storage
in cloud computing”.
[4] B. Wang, B. Li, and H. Li “Public auditing for
shared data with efficient user revocation in
thecloud”.
[5] K. Chard, K. Bubendorfer, S. Caton, and O. F.
Rana “Social cloud computing: A vision for
socially motivated resource sharing”.

More Related Content

What's hot

Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
anupriti
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 

What's hot (17)

Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
Fog doc
Fog doc Fog doc
Fog doc
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
489 493
489 493489 493
489 493
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
F01113945
F01113945F01113945
F01113945
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 

Similar to IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption

Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
dbpublications
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
IJSRED
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
homeworkping7
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
nischal52
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
eSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
eSAT Journals
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
sushil Choudhary
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
IRJET Journal
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
Faimin Khan
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
RodolfoIII2
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 

Similar to IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption (20)

Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) 5041 Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption G.Durvasi1, O.Sumanjali2, T.Kavyasri3, V. Swathisri4 1 AssistantProfessor,DepartmentofInformationTechnology,AndhraLoyolaInstituteof Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India 2 UnderGraduate Student,DepartmentofInformationTechnology,AndhraLoyolaInstituteof Engineering and Technology, Vijayawada-08, Andhra Pradesh,India 3 Under Graduate Student, Department of Information Technology, Andhra Loyola Institute of Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India 4 Under Graduate Student, Department of Information Technology, Andhra Loyola Institute of Engineeringand Technology, Vijayawada-08, Andhra Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing gives a flexible and helpful path for information sharing, which brings different benefits for both the general public and people. However, there exists a characteristic opposition for clients to straightforwardly re- appropriate the common information to the cloud server since the information regularly contain important data. Along these lines, it is important to put cryptographically improved access control on the mutual information. Character based encryption is a promising cryptographical crude to fabricate a useful information sharing framework. Nonetheless, get to control isn't static. That is, the point at which some client's approval is terminated, there ought to be a component that can evacuate him/her from the framework. Therefore, the renounced client can't get to both the beforehand and along these lines shared information. To this end, we propose a thought called revocable storage identity-based encryption (RS-IBE), which can give the forward/in reverse security of ciphertext by presenting the functionalities of client repudiation and ciphertext update at the same time. Besides, we present a solid development of RS-IBE, and demonstrate its security in the defined security model. The presentation examinations show that the proposed RS-IBE plot has points of interest regarding usefulness and efficiency, and along these lines is plausible for a commonsense and financially savvy information sharing framework. Key Words — Cloud computing, information sharing, renouncement, Identity-based encryption, ciphertext update, decoding key introduction. 1. INTRODUCTION Cloud computing is the utilization of processing assets (equipment and programming) that are conveyed as a help over a system (commonly the Internet). The name originates from the normal utilization of a cloud-formed image as a reflection for the mind-boggling foundation it contains in framework outlines. Cloud computing endows remote administrations with a client's information, programming and calculation. Cloud computing comprises of equipment and programming assets made accessible on the Internet as oversaw outsider administrations. These administrations normally give access to cutting edge programming applications and very good quality systems of server PCs. 1.1 How Cloud Computing Works? The objective of cloud computing is to apply conventional supercomputing, or elite registering power, ordinarily utilized by military and research offices, to perform many trillions of calculations for every second, in purchaser arranged applications, for example, budgetary portfolios, to convey customized data, to give information stock piling or to control huge, vivid PC games. The cloud computing utilizes systems of enormous gatherings of servers regularly running ease customer PC innovation with particular associations with spread information preparing errands across them.
  • 2. International Research Journal of Engineering and Technology (IRJET) 1.2 Qualities and Services Models The striking attributes of cloud computing dependent on the definitions gave by the National Institute of Standards and Terminology (NIST) are sketched out beneath: • On request self-administration: A shopper can singularly arrangement registering capacities, for example, servertime and system stockpiling, varying consequently without requiring human cooperation with each serviceprovider. • Broad arrange get to: Capabilities are accessible over the system and gotten to through standard components that advance use by heterogeneous flimsy or thick customer stages (e.g., cell phones, PCs, and PDAs). • Resource pooling: The supplier's registering assets are pooled to serve various buyers utilizing a multi-inhabitant model, with various physical and virtual assets progressively doled out and reassigned by purchaser request. There is a feeling of area autonomy in that the client for the most part has no control or information over the specific area of the gave assets however might have the option to determine area at a more elevated level of reflection (e.g., nation, state, or server farm). Instances of assets incorporate capacity, preparing, memory, arrange data transfer capacity, and virtual machines. • Rapid flexibility: Capabilities can be quickly and flexibly provisioned, at times consequently, to rapidly scale out and quickly discharged to rapidly scale in. To the buyer, the abilities accessible for provisioning frequently have all the earmarks of being boundless and can be bought in any amount whenever. 1.3 Services Models Cloud computing involves three diverse assistance models, to be specific Infrastructure-as-a- Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). The three assistance models or layer are finished by an end client layer that epitomizes the end client point of view on cloud administrations. The model is appeared in figure underneath. On the off chance that a cloud clientgets to administrations on the framework layer, for example, she can run her own applications on the assets of a cloud foundation and stay liable for the help, upkeep, and security of these applications herself. 1.4 Advantages of cloud computing 1.Achieve economies of scale – increment volume yield or profitability with less individuals. Your expense per unit, venture or item plunges. 2.Reduce spending on innovation framework. Keep up simple access to your data with negligible forthright spending. Pay more only as costs arise (week after week, quarterly or yearly), in view of interest. 3.Globalize your workforce for as little as possible. Individuals worldwide can get to the cloud, if they have an Internet association. 4.Streamline procedures. Complete more work in less time with less individuals. 5.Reduce capital expenses. There's no compelling reason to spend huge cash on equipment, programming orpermitting charges. 6.Improve openness. You approach whenever, anyplace, making your life so a lot simpler! 7.Monitor ventures all the more adequately. Remain inside spending plan and in front of finish process durations. 8.Less faculty preparing is required. It takes less individuals to accomplish more work on a cloud, with an insignificant expectation to absorb information on equipment and programming issues. 9.Minimize permitting new programming. Extend and develop without the need to purchase costly programming licenses or projects. 10. Improve adaptability. You can alter course without genuine "individuals" or "budgetary" issues in question. 1.5 Favorable circumstances 1. Price: Pay for just the assets utilized. 2. Security: Cloud occurrences are detached in the system from different examples for improved security. 3. Performance: Instances can be included right away for improved execution. Customers approach theall-outassets of the Cloud's center equipment. 4. Scalability: Auto-convey cloud occasions when required. 5.Uptime: Uses different servers for most extreme redundancies. If there should be an occurrence of server disappointment, examples can be naturally madeonanother server.
  • 3. International Research Journal of Engineering and Technology (IRJET) 2. SYSTEM DESIGN 3. IMPLEMENTATION 3.1 MODULES:  System Construction Module  Data Provider  Cloud User  Key Authority (Auditor) 3.2 MODULES DESCSRIPTION  SystemConstructionModule: In the first module, we develop the proposed system with the required entities for theevaluation of the proposed model. The data provider (e.g., David) first decides the users (e.g., Alice and Bob) who can share the data. Then, David encrypts the data under the identities Alice and Bob, and uploads the ciphertext of the shared data to the cloud server. When either Alice or Bob wants to get the shared data,she or he can download and decrypt the corresponding ciphertext. However, for an unauthorized user and the cloud server, the plaintext of the shared data is not available.  Data Provider: In this module, we develop the Data Provider module. The data provider module is developedsuch that the new users will Signup initially and then Login for authentication. The data provider module provides the option of uploading the file to the Cloud Server. The process of File Uploading to the cloud Server is undergone with Identity-based encryption format. Data Provider will check the progress status of the file upload by him/her. Data Provider provided with the features of Revocation and Ciphertext update the file. Once after completion of the process, the Data Provider logouts thesession.  Cloud User: In this module, we develop the Cloud User module.TheCloud usermodule is developedsuchthat the new users will Signup initially and then Login for authentication. The Cloud user is provided with the option of file search. Then cloud user feature is added up for send the Request to Auditor for the File access. After getting decrypt key from the Auditor, he/she can access to the File. The cloud user is also enabled to download the File.  Key Authority (Auditor): Auditor Will Login on the Auditor's page. He/she will check the pending requests of any of the above person. After accepting the request from the above person, he/she will generate master key for encrypt and Secret key for decrypt. After the complete process, the Auditor logout the session. 4. CONCLUSION Cloud computing brings great convenience for people. Particularly, it perfectly matches the increased need of sharing data over the Internet. In this paper, to build a cost- effective and secure data sharing system in cloud computing, we proposed a notion called RS-IBE, which supports identity revocation and ciphertext update simultaneously such that a revoked user is prevented fromaccessing previously shared data, as well as subsequently shared data. Furthermore, a concrete construction of RS-IBE is presented. The proposed RS-IBE scheme is proved adaptive-secure in the standard model, under the decisional ℓ-DBHE assumption. The comparison results demonstrate that our scheme has advantages in terms of efficiency and functionality, and thus is more feasible for practical applications. REFERENCES [1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner “A break in the clouds: towards a cloud definition” [2] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy preserving public auditing for secure cloud storage”. [3] K. Yang and X. Jia “An efficient and secure dynamic auditing protocol for data storage in cloud computing”. [4] B. Wang, B. Li, and H. Li “Public auditing for shared data with efficient user revocation in thecloud”. [5] K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana “Social cloud computing: A vision for socially motivated resource sharing”.