SlideShare a Scribd company logo
Mona: Secure Multi-Owner Data
Sharing for Dynamic Groups in
the
Cloud
M.SUDHEER KUMAR
13E51D5809
ABSTRACT
• In this paper, we propose a secure multiowner
data sharing scheme, named Mona, for
dynamic groups in the cloud. By leveraging
group signature and dynamic broadcast
encryption techniques, any cloud user can
anonymously share data with others.
EXISTING SYSTEM
 To preserve data privacy, a basic solution is to
encrypt data files, and then upload the
encrypted data into the cloud. Unfortunately,
designing an efficient and secure data sharing
scheme for groups in the cloud is not an easy
task.
EXISTING SYSTEM (Conti.)
 In the existing System data owners store the
encrypted data files in untrusted storage and
distribute the corresponding decryption keys
only to authorized users.
 However, the complexities of user participation
and revocation in these schemes are linearly
increasing with the number of data owners and
the number of revoked users, respectively.
DISADVANTAGES OF EXISTING
SYSTEM
 Only the group manager can store and modify
data in the cloud
 The changes of membership make secure data
sharing extremely difficult the issue of user
revocation is not addressed
PROPOSED SYSTEM
 1. We propose a secure multi-owner data
sharing scheme. It implies that any user in the
group can securely share data with others by
the untrusted cloud.
 2. Our proposed scheme is able to support
dynamic groups efficiently. Specifically, new
granted users can directly decrypt data files
uploaded before their participation without
contacting with data owners.
PROPOSED SYSTEM
 3. We provide secure and privacy-preserving
access control to users, which guarantees any
member in a group to anonymously utilize the
cloud resource.
 4. We provide rigorous security analysis, and
perform extensive simulations to demonstrate
the efficiency of our scheme in terms of storage
and computation overhead.
ADVANTAGES OF PROPOSED
SYSTEM
 Any user in the group can store and share data
files with others by the cloud.
 The encryption complexity and size of
ciphertexts are independent with the number of
revoked users in the system.
 User revocation can be achieved without
updating the private keys of the remaining
users.
SYSTEM ARCHITECTURE
ALGORITHM USED
 Signature Generation
 Signature Verification
 Revocation Verification
MODULES
 1.Cloud Module
 2.Group Manager Module
 3.Group Member Module
 4.File Security Module
 5.Group Signature Module
 6. User Revocation Module .
Cloud Module
 In this module, we create a local Cloud and
provide priced abundant storage services. The
users can upload their data in the cloud. We
develop this module, where the cloud storage
can be made secure. However, the cloud is not
fully trusted by users since the CSPs are very
likely to be outside of the cloud users’ trusted
domain. Similar to we assume that the cloud
server is honest but curious.
Group Manager Module :
 Group manager takes charge of followings,
 1. System parameters generation,
 2. User registration,
 3. User revocation, and
 4. Revealing the real identity of a dispute data
owner
Group Member Module :
 Group members are a set of registered users
that will
 store their private data into the cloud server
and
 Share them with others in the group.
File Security Module :
 1. Encrypting the data file.
 2. File stored in the cloud can be deleted by
either the group manager or the data owner.
Group Signature Module :
 A group signature scheme allows any member
of the group to sign messages while keeping
the identity secret from verifiers. Besides, the
designated group manager can reveal the
identity of the signature’s originator when a
dispute occurs, which is denoted as
traceability.
User Revocation Module :
 User revocation is performed by the group
manager via a public available revocation list
(RL), based on which group members can
encrypt their data files and ensure the
confidentiality against the revoked users.
HARDWARE
CONFIGURATION
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows
Keyboard
 Monitor - SVGA
SOFTWARE CONFIGURATION
 Operating System : Windows XP.
 Coding Language : JAVA/JSP
 Database : MYSQL
 Server : Apache Tomcat
REFERENCE
 Xuefeng Liu, Yuqing Zhang, Boyang Wang,
and Jingbo Yan, “Mona: Secure Multi-Owner
Data Sharing for Dynamic Groups in the
Cloud”, IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 24, NO. 6, JUNE 2013.
Thank You

More Related Content

What's hot

Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7
Amit Chandra
 
Dbms notes
Dbms notesDbms notes
Dbms Interview Question And Answer
Dbms Interview Question And AnswerDbms Interview Question And Answer
Dbms Interview Question And Answer
Jagan Mohan Bishoyi
 
Corso access 2010
Corso access 2010Corso access 2010
Corso access 2010
Ivano Esposito
 
Distributed database system
Distributed database systemDistributed database system
Distributed database system
M. Ahmad Mahmood
 
data manipulation language
data manipulation languagedata manipulation language
data manipulation language
JananiSelvaraj10
 
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
NGINX, Inc.
 
Knowledge discovery thru data mining
Knowledge discovery thru data miningKnowledge discovery thru data mining
Knowledge discovery thru data mining
Devakumar Jain
 
lec6
lec6lec6
lec6
alaa223
 
Software requirements specifications wp2
Software requirements specifications wp2Software requirements specifications wp2
Software requirements specifications wp2
ambitlick
 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptx
maha797959
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
Adeel Rasheed
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
Mustafa Khan
 
Displaying XML Documents Using CSS and XSL
Displaying XML Documents Using CSS and XSLDisplaying XML Documents Using CSS and XSL
Displaying XML Documents Using CSS and XSL
Bình Trọng Án
 
Distributed file systems chapter 9
Distributed file systems chapter 9Distributed file systems chapter 9
Distributed file systems chapter 9
Alagappa Government Arts College, Karaikudi
 
8 query processing and optimization
8 query processing and optimization8 query processing and optimization
8 query processing and optimization
Kumar
 
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
sumithragunasekaran
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
gourav kottawar
 
client server architecture
client server architecture client server architecture
client server architecture
Saurabh Soni
 
Online analytical processing
Online analytical processingOnline analytical processing
Online analytical processing
nurmeen1
 

What's hot (20)

Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7
 
Dbms notes
Dbms notesDbms notes
Dbms notes
 
Dbms Interview Question And Answer
Dbms Interview Question And AnswerDbms Interview Question And Answer
Dbms Interview Question And Answer
 
Corso access 2010
Corso access 2010Corso access 2010
Corso access 2010
 
Distributed database system
Distributed database systemDistributed database system
Distributed database system
 
data manipulation language
data manipulation languagedata manipulation language
data manipulation language
 
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
What’s New in NGINX Ingress Controller for Kubernetes Release 1.5.0
 
Knowledge discovery thru data mining
Knowledge discovery thru data miningKnowledge discovery thru data mining
Knowledge discovery thru data mining
 
lec6
lec6lec6
lec6
 
Software requirements specifications wp2
Software requirements specifications wp2Software requirements specifications wp2
Software requirements specifications wp2
 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptx
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
Displaying XML Documents Using CSS and XSL
Displaying XML Documents Using CSS and XSLDisplaying XML Documents Using CSS and XSL
Displaying XML Documents Using CSS and XSL
 
Distributed file systems chapter 9
Distributed file systems chapter 9Distributed file systems chapter 9
Distributed file systems chapter 9
 
8 query processing and optimization
8 query processing and optimization8 query processing and optimization
8 query processing and optimization
 
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
client server architecture
client server architecture client server architecture
client server architecture
 
Online analytical processing
Online analytical processingOnline analytical processing
Online analytical processing
 

Viewers also liked

Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Krushna Panda
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Ninad Samel
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shruthi Suresh
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 

Viewers also liked (7)

Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 

Similar to Mona final review

A secure anti collision data sharing scheme in dynamic groups in the cloud
A secure anti collision data sharing scheme in dynamic groups in the cloudA secure anti collision data sharing scheme in dynamic groups in the cloud
A secure anti collision data sharing scheme in dynamic groups in the cloud
CrystalRose25
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharing
CrystalRose25
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Kamal Spring
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd Iaetsd
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Eswar Publications
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
paperpublications3
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Editor IJARCET
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
MSMuthu5
 
Paper2
Paper2Paper2
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALSEMSTUDENTPROJECTS
 

Similar to Mona final review (20)

A secure anti collision data sharing scheme in dynamic groups in the cloud
A secure anti collision data sharing scheme in dynamic groups in the cloudA secure anti collision data sharing scheme in dynamic groups in the cloud
A secure anti collision data sharing scheme in dynamic groups in the cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A secure anti collision data sharing
A secure anti collision data sharingA secure anti collision data sharing
A secure anti collision data sharing
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
Paper2
Paper2Paper2
Paper2
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 

Mona final review

  • 1. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud M.SUDHEER KUMAR 13E51D5809
  • 2. ABSTRACT • In this paper, we propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others.
  • 3. EXISTING SYSTEM  To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud. Unfortunately, designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task.
  • 4. EXISTING SYSTEM (Conti.)  In the existing System data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users.  However, the complexities of user participation and revocation in these schemes are linearly increasing with the number of data owners and the number of revoked users, respectively.
  • 5. DISADVANTAGES OF EXISTING SYSTEM  Only the group manager can store and modify data in the cloud  The changes of membership make secure data sharing extremely difficult the issue of user revocation is not addressed
  • 6. PROPOSED SYSTEM  1. We propose a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud.  2. Our proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners.
  • 7. PROPOSED SYSTEM  3. We provide secure and privacy-preserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource.  4. We provide rigorous security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead.
  • 8. ADVANTAGES OF PROPOSED SYSTEM  Any user in the group can store and share data files with others by the cloud.  The encryption complexity and size of ciphertexts are independent with the number of revoked users in the system.  User revocation can be achieved without updating the private keys of the remaining users.
  • 10. ALGORITHM USED  Signature Generation  Signature Verification  Revocation Verification
  • 11. MODULES  1.Cloud Module  2.Group Manager Module  3.Group Member Module  4.File Security Module  5.Group Signature Module  6. User Revocation Module .
  • 12. Cloud Module  In this module, we create a local Cloud and provide priced abundant storage services. The users can upload their data in the cloud. We develop this module, where the cloud storage can be made secure. However, the cloud is not fully trusted by users since the CSPs are very likely to be outside of the cloud users’ trusted domain. Similar to we assume that the cloud server is honest but curious.
  • 13. Group Manager Module :  Group manager takes charge of followings,  1. System parameters generation,  2. User registration,  3. User revocation, and  4. Revealing the real identity of a dispute data owner
  • 14. Group Member Module :  Group members are a set of registered users that will  store their private data into the cloud server and  Share them with others in the group.
  • 15. File Security Module :  1. Encrypting the data file.  2. File stored in the cloud can be deleted by either the group manager or the data owner.
  • 16. Group Signature Module :  A group signature scheme allows any member of the group to sign messages while keeping the identity secret from verifiers. Besides, the designated group manager can reveal the identity of the signature’s originator when a dispute occurs, which is denoted as traceability.
  • 17. User Revocation Module :  User revocation is performed by the group manager via a public available revocation list (RL), based on which group members can encrypt their data files and ensure the confidentiality against the revoked users.
  • 18. HARDWARE CONFIGURATION  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Monitor - SVGA
  • 19. SOFTWARE CONFIGURATION  Operating System : Windows XP.  Coding Language : JAVA/JSP  Database : MYSQL  Server : Apache Tomcat
  • 20.
  • 21.
  • 22. REFERENCE  Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013.