SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 539
Secure Data Sharing In Cloud Computing Using Revocable Storage
Identity Based Encryption
GANESHAN M1, SHAYAN SOMANNA N. N 2
1Professor, School of CS & IT, Jain University, Bangalore, Karnataka, India
2PG Scholar – School of CS & IT, Jain University, Bangalore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is a worldview that gives
enormous calculation limit and immense memory space
effortlessly. It empowers clients to get expected
administrations independent of time and area over various
stages (e.g., cell phones, PCs), and along these lines conveys
incredible accommodation to cloud clients. In any case, it
additionally experiences a few security dangers, whicharethe
essential worries of cloud users. Consequently, so as to share
the information secure cryptographically get to control is
needed. Character based encryption is utilized to assemble
information sharing system. All together, get to control is not
static. It implies that when approval of a few clients is lapsed,
the framework should evacuate his (or) him. By that the
expelled client can't get to both forward and in reverse
information. For this we utilize an idea called reversible-
storage identity based encryption (RS-IBE), which give
security of figure contenttoforward/inreverseinformation by
presenting the client renouncement functionalities and
concurrent update of figure content. We give a point by point
structure of RS-IBE, which confirms its mystery in the
portrayed security model. The sensible and financially savvy
arrangement of information sharing is accomplished by this
RS-IBE plot which has colossal advantages of operability
what's more, ability. Absolutely, we give execution result of
this recommended plan to characterize its feasibility.
Key Words: Encryption, Private Key, Cipher text
1. INTRODUCTION
Cloud computing is a model in Innovationofinformation(IT)
that gives omnipresent access to shared pools of
configurable framework assets and frequently over the
internet, Service of larger amount with insignificant
administration exertion can be quickly provisioned. Cloud
processing depends on sharing of assets to accomplish
lucidness and economy of scale, like an utility.ID-based
encryption, or on the other hand characterbasedencryption
(IBE), is an significant crude of ID-basedcryptography.Since
a sort of open key encryption client of open key has a few
one of a kind data about the client personality (for example
email address of client). This implies a sender who
approaches the general population parameters of the
framework can scramble a message utilizingfor examplethe
content estimation of the collector's name or email address
as a key. From the focal specialist the unscrambling keys are
acquired to the collector, which should be trusted as it
produces mystery keys for each user.By knowing the ASCII
string in arrangement ofIdentityBasedpermittoproducean
open key by known character an incentive by any party. A
comparing private keys are created by confided in outsider,
called the Private Key Generator (PKG) . So as to relating
private key are to be acquire, character ID contacts the PKG
utilized by the party approved , to produce the private key
for character ID which utilizes the ace private key.
Re-appropriating information to cloud server suggests that
information is out control of clients. This may cause clients'
faltering since the re-appropriated information normally
contain profitable and touchy information. Much more
terrible, cloud server itself may uncover clients'information
for illicit benefit. Information sharing isn't static. Whenever
the approval of client is terminated, he/she could not access
the already and therefore shared data. In this manner, while
re-appropriating information to cloud server, clients
additionally need to control accesstotheseinformation with
the end goal that as it were those as of now approved clients
can share the redistributed data. An answer for beat the
issue is to use get to control, for example, personality based
encryption (IBE).
2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
Non revokedclients are proposed in IBE fromthemethodfor
normal denial in which the private keys are intermittently
gotten all time from key provider. Since , the arrangement
isn't steady, the non – revoked clients requires the approval
of key to perform the needed work. All together in order to
transmit new keys and forapproval ofkeyasecurechannelis
fundamental.
The ciphertext current timeframewasannexed by them, and
Approvalofkeywascreatednon-revokedclientsoccasionally
in the type of private keys.
To accomplish productive repudiation an approach was
delivered by Goyal , Boldyreva and Kumar. They utilized a
twofold tree to oversee character such that their RIBE
conspire diminishes the multifaceted nature of key
renouncement to logarithmic(rather thandirect)inthemost
extreme number of framework users.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 540
Disadvantages of existing framework:
• It's not adaptable.
• It's not secure.
2.2 PROPOSED SYSTEM:
To beat the current framework present a methodology an
idea called reversible identity based encryption (RS-IBE) so
as to fabricate information sharing framework by practical
that satisfies the three security objectives.
• We give formal definitions to RS-IBE also, its relating
security model.
• We present a solid development of RSIBE. The proposed
plan can give privacy and in reverse/forward2 mystery all
the while.
• Byutilizingtheℓ-BilinearDiffie-HellmanExample(ℓ-BDHE)
measurement , wedemonstrate thesecurityfortheproposed
model. In request, the proposed plan canwithstanddecoding
key presentation.
Advantages of proposed Framework:
• The system of ciphertext update just needs open data or
public data.
• By the forward mystery extra calculation and capacity
unpredictability was brought.
3. SYSTEM ARCHITECTURE
Identity put together access control set with respect to the
shared information should meet the accompanying security
objectives:
 Information secrecy:
Plaintext of the common information put away in
the cloud server ought to be kept from getting to the
information by unapproved clients .
 Backward secrecy:
Mystery on Backward implies , when the expert of
client's was lapsed, ormysterykeyofclient wasundermined,
Previously gotten to information by him/her ought to be
kept from getting to the plain content of shared information
by under personality of his/her the in this way shared
information of plain content are still encrypted.
 Forward secrecy:
Secrecy on forward methods , when the specialist
of client's was lapsed, or mystery key of client was
undermined, Previously gotten to information by him/her
ought to be kept from getting to the plain content of shared
information at this point . Under personality of his/her the
hence shared information of plain content are still
encrypted.
4. PERFORMANCE DISCUSSIONS
4.1 Our contributions
In this paper, we present a thought called reversible storage
character based encryption (RS-CBE) for structure a
financially savvy information sharing framework thatfulfills
the three security objectives. All the more correctly, the
accompanying accomplishments are caught in this paper:
• We give formal definitions to RS-IBE and its comparing
security model; • We present a solid development of RS-IBE.
The proposed plan can give confidentiality and in
reverse/forward2 mystery all the while; • We demonstrate
the security of the proposed plan in the standard model,
under the decisional ℓ-Bilinear Diffie-Hellman Exponent (ℓ-
BDHE) suspicion. Furthermore, the proposed plan can
withstand unscrambling key presentation; • The proposed
plan is efficient in the accompanying ways:
1. They used the plan to give the forward mystery of
ciphertext, as opposed to mystery key as in the first
case. 2. As in [37], our plan accomplishes forward
security under the suspicion that the scrambled
information is put away in the cloud and clients
don't store the encoded/decoded information
locally.
2. The strategy of ciphertext update just needs open
data. Note that no past character based encryption
plots in the writing can give this element; – The
extra calculation and capacity multifaceted nature,
which are presented in by the forwardsecrecy,isall
upper limited by O(log(T)2), where T is the all out
number of timespans.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 541
5. IMPLEMENTATION
 System Construction Module:
In the firstmodule,theproposedframework was
created with the required substances for the assessment of
the proposed model. The client was frist chosen by the
information supplier who can share the information. At that
point, Data supplier scrambles the information under the
characters client, also, transfers sharedinformationoffigure
content to the cloud server. At the point when clients needs
to get the shared information, she/he can download and
decode the comparing ciphertext. Notwithstanding, for an
unapproved client and the cloud server, the plaintext of the
common information isn't available.
 Information Provider:
In the second module, Data Provider module was
created. The advancement of informationsuppliermoduleis
for which the new clients will Signup first and after that
Login for verification. By here the information supplier
module gives the alternative of transferringthedocument to
the Cloud Server]. By utilizing identity based encryption
design the procedure of File Uploading to the cloud server is
done. He/she can check the advance status of transferring
the document . Information Supplier gave the highlights of
Denial and Ciphertext update the document. When the
procedure is finished , the Data Supplier can logouts the
session.
 Cloud User:
In this module, Cloud User module was created . The
Cloud client module is grown with the end goal that the new
clients will Information exchange at firstandafterthatLogin
for validation. The document look choice will begivenbythe
Cloud use. At that point cloud client include is included for
send the Request to Auditor for the File get to. In the wakeof
getting unscramble key from the Auditor, he/she can access
to the File. The cloud client is too empowered to download
the File. After culmination of the procedure, theclientlogout
the session.
 Key Authority (Auditor) :
Inspector's page will be sign in by the evaluator.
He/she will check the pending solicitations of any of the
above individual. In the wake of tolerating the demand from
the above individual, he/she will create ace key for encode
and mystery key for decrypt. After the total process, the
Auditor logout the session.
6. CONCLUSION AND FUTURE ENHANCEMENT
6.1 CONCLUSION
The specific issue tended to in this paper is the way to
develop a basic personality based cryptographical device to
accomplish the above security objectives. We additionally
note that there exist other security issues that are similarly
significant for a viable arrangement of data sharing, for
example, the genuineness and accessibility of the mutual
data. Yet, the exploration on these issues is past the extentof
this paper.
6.2 FUTURE ENHANCEMENT
Future arrangement can achieve securecustomerdenial,the
disavowed customers can't have the ability to get the
primary data records once they are disavowed paying little
respect to the likelihood that they plot with the untrusted
cloud. A future research course is discover ways for an
information proprietor to considerresponsibleany partthat
does malevolent exercises on their information. Another
examination bearing is give the information proprietor
physical get to power over the information. Rather than
responsibility, the information proprietor can make a lot of
access control rules on his information and send the
information alongside the entrance control approach. Along
these lines, any part with access to the information can just
utilize the information so that keeps the entrance control
approach. On the off chance that a part endeavors to make
unlawful duplicates of the information, the entrance control
arrangement should "lock" the information to avert the part
from doing as such.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 542
REFERNCES
1. Jianghong Wei, WenfenLiu,XuexianHu-IEEETransactions
on Cloud Computing ( Volume: PP, Issue: 99 ) March 2016 .
2. Amazon. (2014) Amazon simple storage service (amazon
s3). [Online]. Available: http://aws.amazon.com/s3/ .
3. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social
cloud computing: A vision for socially motivated resource
sharing,” Services Computing, IEEE Transactions on, vol. 5,
no. 4, pp. 551–563, 2012.
4. B. Wang, B. Li, and H. Li, “Public auditing for shared data
with efficient user revocation in the cloud,” in INFOCOM,
2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912.
5. B. Wang, B. Li, and H. Li, ―Public auditing for shared data
with efficient user revocation in the cloud,‖ in INFOCOM,
2013Proceedings IEEE. IEEE, 2013, pp. 2904–2912.
6. DrAnanthi Sheshasaayee, 2R. Megala, “A Conceptual
Framework For Resource Utilization In Cloud Using Map
Reduce Scheduler” International Journal of Innovations in
Scientific and Engineering Research (IJISER), Vol. 4, No.6,
pp.188-190, 2017.
7. S. Ruj, M. Stojmenovic, and A. Nayak, ―Decentralized
accesscontrol with anonymous authenticationofdata stored
in clouds,‖ Parallel and Distributed Systems, IEEE
Transactions on, vol. 25, no. 2,pp. 384–394, 2014.
8. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J.
Zhou, ―Costeffective authentic and anonymous data
sharingwith forward security,‖ Computers, IEEE
Transactions on, 2014, doi:10.1109/TC.2014.2315619.
9. Mohan, Prakash, and Ravichandran Thangavel.
"ResourceSelection in Grid Environment Based on Trust
Evaluation usingFeedback and Performance." American
Journal of AppliedSciences 10.8 (2013): 924.
10. Prakash, M., and T. Ravichandran. "An Efficient
ResourceSelection and Binding Model for Job Scheduling in
Grid."European Journal of Scientific Research 81.4 (2012):
450-458.
11. Jin Li (School of Computer Science, Guangzhou
University,Guangzhou, China),Wenjing Lou (Virginia
Polytechnic Institute and State University, Blacksburg)
“Identity based encryption with outsourced revocation in
cloud computing” 2015.
12. Prakash, M., R. Farah Sayeed, S. Princey, and S.
Priyanka."Deployment of MultiCloud Environment with
Avoidance of DDOS Attack and Secured Data Privacy."
International Journal of Applied Engineering Research 10,
no. 9 (2015): 8121-8124.
13. K. Yang and X. Jia, “An efficient and secure dynamic
auditing protocol for data storage in cloud computing,”
Parallel and Distributed Systems, IEEE Transactions on, vol.
24, no. 9, pp. 1717–1726, 2013.
14. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W.Lou,“Privacy
preserving public auditing for secure cloud storage,”
Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375,
2013.

More Related Content

What's hot

A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibc
Lokesh Gopu
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network security
smumbahelp
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Publishing House
 
581 517-525
581 517-525581 517-525
581 517-525
idescitation
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
Shakas Technologies
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
 

What's hot (18)

A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibc
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network security
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
581 517-525
581 517-525581 517-525
581 517-525
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 

Similar to IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption

IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 

Similar to IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption (20)

IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
DebendraDevKhanal1
 
Advancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdfAdvancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdf
JaveedKhan59
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
nonods
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
 
Advancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdfAdvancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdf
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
一比一原版(psu学位证书)美国匹兹堡州立大学毕业证如何办理
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identity based Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 539 Secure Data Sharing In Cloud Computing Using Revocable Storage Identity Based Encryption GANESHAN M1, SHAYAN SOMANNA N. N 2 1Professor, School of CS & IT, Jain University, Bangalore, Karnataka, India 2PG Scholar – School of CS & IT, Jain University, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is a worldview that gives enormous calculation limit and immense memory space effortlessly. It empowers clients to get expected administrations independent of time and area over various stages (e.g., cell phones, PCs), and along these lines conveys incredible accommodation to cloud clients. In any case, it additionally experiences a few security dangers, whicharethe essential worries of cloud users. Consequently, so as to share the information secure cryptographically get to control is needed. Character based encryption is utilized to assemble information sharing system. All together, get to control is not static. It implies that when approval of a few clients is lapsed, the framework should evacuate his (or) him. By that the expelled client can't get to both forward and in reverse information. For this we utilize an idea called reversible- storage identity based encryption (RS-IBE), which give security of figure contenttoforward/inreverseinformation by presenting the client renouncement functionalities and concurrent update of figure content. We give a point by point structure of RS-IBE, which confirms its mystery in the portrayed security model. The sensible and financially savvy arrangement of information sharing is accomplished by this RS-IBE plot which has colossal advantages of operability what's more, ability. Absolutely, we give execution result of this recommended plan to characterize its feasibility. Key Words: Encryption, Private Key, Cipher text 1. INTRODUCTION Cloud computing is a model in Innovationofinformation(IT) that gives omnipresent access to shared pools of configurable framework assets and frequently over the internet, Service of larger amount with insignificant administration exertion can be quickly provisioned. Cloud processing depends on sharing of assets to accomplish lucidness and economy of scale, like an utility.ID-based encryption, or on the other hand characterbasedencryption (IBE), is an significant crude of ID-basedcryptography.Since a sort of open key encryption client of open key has a few one of a kind data about the client personality (for example email address of client). This implies a sender who approaches the general population parameters of the framework can scramble a message utilizingfor examplethe content estimation of the collector's name or email address as a key. From the focal specialist the unscrambling keys are acquired to the collector, which should be trusted as it produces mystery keys for each user.By knowing the ASCII string in arrangement ofIdentityBasedpermittoproducean open key by known character an incentive by any party. A comparing private keys are created by confided in outsider, called the Private Key Generator (PKG) . So as to relating private key are to be acquire, character ID contacts the PKG utilized by the party approved , to produce the private key for character ID which utilizes the ace private key. Re-appropriating information to cloud server suggests that information is out control of clients. This may cause clients' faltering since the re-appropriated information normally contain profitable and touchy information. Much more terrible, cloud server itself may uncover clients'information for illicit benefit. Information sharing isn't static. Whenever the approval of client is terminated, he/she could not access the already and therefore shared data. In this manner, while re-appropriating information to cloud server, clients additionally need to control accesstotheseinformation with the end goal that as it were those as of now approved clients can share the redistributed data. An answer for beat the issue is to use get to control, for example, personality based encryption (IBE). 2. SYSTEM ANALYSIS 2.1 EXISTING SYSTEM: Non revokedclients are proposed in IBE fromthemethodfor normal denial in which the private keys are intermittently gotten all time from key provider. Since , the arrangement isn't steady, the non – revoked clients requires the approval of key to perform the needed work. All together in order to transmit new keys and forapproval ofkeyasecurechannelis fundamental. The ciphertext current timeframewasannexed by them, and Approvalofkeywascreatednon-revokedclientsoccasionally in the type of private keys. To accomplish productive repudiation an approach was delivered by Goyal , Boldyreva and Kumar. They utilized a twofold tree to oversee character such that their RIBE conspire diminishes the multifaceted nature of key renouncement to logarithmic(rather thandirect)inthemost extreme number of framework users.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 540 Disadvantages of existing framework: • It's not adaptable. • It's not secure. 2.2 PROPOSED SYSTEM: To beat the current framework present a methodology an idea called reversible identity based encryption (RS-IBE) so as to fabricate information sharing framework by practical that satisfies the three security objectives. • We give formal definitions to RS-IBE also, its relating security model. • We present a solid development of RSIBE. The proposed plan can give privacy and in reverse/forward2 mystery all the while. • Byutilizingtheℓ-BilinearDiffie-HellmanExample(ℓ-BDHE) measurement , wedemonstrate thesecurityfortheproposed model. In request, the proposed plan canwithstanddecoding key presentation. Advantages of proposed Framework: • The system of ciphertext update just needs open data or public data. • By the forward mystery extra calculation and capacity unpredictability was brought. 3. SYSTEM ARCHITECTURE Identity put together access control set with respect to the shared information should meet the accompanying security objectives:  Information secrecy: Plaintext of the common information put away in the cloud server ought to be kept from getting to the information by unapproved clients .  Backward secrecy: Mystery on Backward implies , when the expert of client's was lapsed, ormysterykeyofclient wasundermined, Previously gotten to information by him/her ought to be kept from getting to the plain content of shared information by under personality of his/her the in this way shared information of plain content are still encrypted.  Forward secrecy: Secrecy on forward methods , when the specialist of client's was lapsed, or mystery key of client was undermined, Previously gotten to information by him/her ought to be kept from getting to the plain content of shared information at this point . Under personality of his/her the hence shared information of plain content are still encrypted. 4. PERFORMANCE DISCUSSIONS 4.1 Our contributions In this paper, we present a thought called reversible storage character based encryption (RS-CBE) for structure a financially savvy information sharing framework thatfulfills the three security objectives. All the more correctly, the accompanying accomplishments are caught in this paper: • We give formal definitions to RS-IBE and its comparing security model; • We present a solid development of RS-IBE. The proposed plan can give confidentiality and in reverse/forward2 mystery all the while; • We demonstrate the security of the proposed plan in the standard model, under the decisional ℓ-Bilinear Diffie-Hellman Exponent (ℓ- BDHE) suspicion. Furthermore, the proposed plan can withstand unscrambling key presentation; • The proposed plan is efficient in the accompanying ways: 1. They used the plan to give the forward mystery of ciphertext, as opposed to mystery key as in the first case. 2. As in [37], our plan accomplishes forward security under the suspicion that the scrambled information is put away in the cloud and clients don't store the encoded/decoded information locally. 2. The strategy of ciphertext update just needs open data. Note that no past character based encryption plots in the writing can give this element; – The extra calculation and capacity multifaceted nature, which are presented in by the forwardsecrecy,isall upper limited by O(log(T)2), where T is the all out number of timespans.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 541 5. IMPLEMENTATION  System Construction Module: In the firstmodule,theproposedframework was created with the required substances for the assessment of the proposed model. The client was frist chosen by the information supplier who can share the information. At that point, Data supplier scrambles the information under the characters client, also, transfers sharedinformationoffigure content to the cloud server. At the point when clients needs to get the shared information, she/he can download and decode the comparing ciphertext. Notwithstanding, for an unapproved client and the cloud server, the plaintext of the common information isn't available.  Information Provider: In the second module, Data Provider module was created. The advancement of informationsuppliermoduleis for which the new clients will Signup first and after that Login for verification. By here the information supplier module gives the alternative of transferringthedocument to the Cloud Server]. By utilizing identity based encryption design the procedure of File Uploading to the cloud server is done. He/she can check the advance status of transferring the document . Information Supplier gave the highlights of Denial and Ciphertext update the document. When the procedure is finished , the Data Supplier can logouts the session.  Cloud User: In this module, Cloud User module was created . The Cloud client module is grown with the end goal that the new clients will Information exchange at firstandafterthatLogin for validation. The document look choice will begivenbythe Cloud use. At that point cloud client include is included for send the Request to Auditor for the File get to. In the wakeof getting unscramble key from the Auditor, he/she can access to the File. The cloud client is too empowered to download the File. After culmination of the procedure, theclientlogout the session.  Key Authority (Auditor) : Inspector's page will be sign in by the evaluator. He/she will check the pending solicitations of any of the above individual. In the wake of tolerating the demand from the above individual, he/she will create ace key for encode and mystery key for decrypt. After the total process, the Auditor logout the session. 6. CONCLUSION AND FUTURE ENHANCEMENT 6.1 CONCLUSION The specific issue tended to in this paper is the way to develop a basic personality based cryptographical device to accomplish the above security objectives. We additionally note that there exist other security issues that are similarly significant for a viable arrangement of data sharing, for example, the genuineness and accessibility of the mutual data. Yet, the exploration on these issues is past the extentof this paper. 6.2 FUTURE ENHANCEMENT Future arrangement can achieve securecustomerdenial,the disavowed customers can't have the ability to get the primary data records once they are disavowed paying little respect to the likelihood that they plot with the untrusted cloud. A future research course is discover ways for an information proprietor to considerresponsibleany partthat does malevolent exercises on their information. Another examination bearing is give the information proprietor physical get to power over the information. Rather than responsibility, the information proprietor can make a lot of access control rules on his information and send the information alongside the entrance control approach. Along these lines, any part with access to the information can just utilize the information so that keeps the entrance control approach. On the off chance that a part endeavors to make unlawful duplicates of the information, the entrance control arrangement should "lock" the information to avert the part from doing as such.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 542 REFERNCES 1. Jianghong Wei, WenfenLiu,XuexianHu-IEEETransactions on Cloud Computing ( Volume: PP, Issue: 99 ) March 2016 . 2. Amazon. (2014) Amazon simple storage service (amazon s3). [Online]. Available: http://aws.amazon.com/s3/ . 3. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A vision for socially motivated resource sharing,” Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551–563, 2012. 4. B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912. 5. B. Wang, B. Li, and H. Li, ―Public auditing for shared data with efficient user revocation in the cloud,‖ in INFOCOM, 2013Proceedings IEEE. IEEE, 2013, pp. 2904–2912. 6. DrAnanthi Sheshasaayee, 2R. Megala, “A Conceptual Framework For Resource Utilization In Cloud Using Map Reduce Scheduler” International Journal of Innovations in Scientific and Engineering Research (IJISER), Vol. 4, No.6, pp.188-190, 2017. 7. S. Ruj, M. Stojmenovic, and A. Nayak, ―Decentralized accesscontrol with anonymous authenticationofdata stored in clouds,‖ Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2,pp. 384–394, 2014. 8. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, ―Costeffective authentic and anonymous data sharingwith forward security,‖ Computers, IEEE Transactions on, 2014, doi:10.1109/TC.2014.2315619. 9. Mohan, Prakash, and Ravichandran Thangavel. "ResourceSelection in Grid Environment Based on Trust Evaluation usingFeedback and Performance." American Journal of AppliedSciences 10.8 (2013): 924. 10. Prakash, M., and T. Ravichandran. "An Efficient ResourceSelection and Binding Model for Job Scheduling in Grid."European Journal of Scientific Research 81.4 (2012): 450-458. 11. Jin Li (School of Computer Science, Guangzhou University,Guangzhou, China),Wenjing Lou (Virginia Polytechnic Institute and State University, Blacksburg) “Identity based encryption with outsourced revocation in cloud computing” 2015. 12. Prakash, M., R. Farah Sayeed, S. Princey, and S. Priyanka."Deployment of MultiCloud Environment with Avoidance of DDOS Attack and Secured Data Privacy." International Journal of Applied Engineering Research 10, no. 9 (2015): 8121-8124. 13. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013. 14. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W.Lou,“Privacy preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.