SlideShare a Scribd company logo
DEPARTMENT OF COMPUTER ENGINEERING
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY,
BAVDHAN,PUNE-411021
AY-2015-2016
A Seminar
On
“Secure Data Sharing For Dynamic Groups in Multi-Owner Using Cloud”
By
Mr. Sagar A. Dhanake
Under guidance of
Prof.V.S.Nandedkar
CONTENTS
.
1. Cloud Computing
2. Introduction
3. Motivation
4. Literature Survey
5. Problem Definition
6. System Architecture
7. System Models
8. Modules
9. Algorithms
10.Applications
11. Advantages
12. Conclusion
13. Future Scope
14. References
Cloud Computing???
.
Cloud computing is the access to computers and their functionality
via the Internet or a local area network. Users of a cloud request this
access from a set of web services that manage a pool of computing
resources.
The user cannot actually see or specify the physical location and
organization of the equipment hosting the resources they are
ultimately allowed to use. That is, the resources are drawn from a
“cloud” of resources when they are granted to a user and returned to
the cloud when they are released.
A “cloud” is a set of machines and web services that implement
cloud computing.
INTRODUCTION
.
Cloud computing is providing the identity privacy as one of its
obstacles without this user may not show interest to use the cloud
systems. Here unconditional identity is giving a chance to privacy
Problems.
The data owners store the encrypted data files in untrusted storage
and distribute the corresponding decryption keys only to authorized
users.
It also maintains the revocation list that gives the information
about the current group members. Changes of membership make
secure data sharing highly difficult. Key management is also become
difficult for every change of membership in the list.
To solve the above challenging issues here introduced the MONA,
Multi-owner data sharing-any one of the group member can securely
share and store the data with others by the untrusted cloud.
INTRODUCTION (Conti…)
Dynamic group management-This scheme is able to support
dynamic groups efficiently. Specifically, new granted users can
directly decrypt data files uploaded before their participation
without contacting with data owners.
Secure sharing and privacy preserving access control to users
is providing. So that when ever dispute occurs data owners real
identities will be revealed by group manager.
Also provide secure and privacy-preserving access control to
users, which guarantees any member in a group to anonymously
utilize the cloud resource.
It can provide strict security analysis, and perform extensive
simulations to demonstrate the efficiency of our scheme in terms
of storage and computation overhead.
MOTIVATION
Cloud computing is providing the basic characteristics such as
low maintenance and resource sharing.
In multiple-owner any one of the group member can share,
store or modify the data. So that all the members can enjoy the
storing and sharing of data across the cloud.
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
User revocation is performed by the group manager via a
public available revocation list (RL).
To transmit encrypted data to a set of users so that only a
privileged subset of users can decrypt the data.
LITERATURE SURVEY
SrNo Title Journal Description
1. A Dynamic
Secure Group Sharing
Framework in Public
Cloud Computing
IEEE Transactions on Cloud
Computing, vol. 2, No. 4,
Oct-Dec 2014
In this paper proposed a
dynamic secure group sharing
framework in public cloud
computing environment.
2. Mona: Secure Multi-
Owner Data Sharing
for Dynamic Groups in
the Cloud
IEEE Transactions on
Parallel and Distributed
Systems Vol. 24, NO. 6,
June 2013
In this paper design a secure
data sharing scheme, Mona, for
dynamic groups in an untrusted
cloud.
3 A Cloud Security
Framework for Data
Sharing in Dynamic
Gruoups
IJESR/October 2014/ Vol-
4/Issue-10/652-658.
In this paper design a secure
data sharing scheme, a user is
able to share data with others in
the group without revealing
identity privacy to the cloud.
4 Mona: Secure Multi-
Owner Data
Sharing for Dynamic
Groups in the Cloud
IJERA, January 2015 In this paper user is able to
share data with others in the
group without revealing
identity privacy to the cloud
and supports efficient user
revocation and new user
joining.
PROBLEM DEFINITION
Problem Statement
Secure multi-owner data sharing scheme, it implies that any user
in the group can securely share data with others by the untrusted
cloud. Support dynamic groups efficiently. Specifically, new
granted users can directly decrypt data files uploaded before
their participation without contacting with data owners.
SYSTEM ARCHITECTURE
SYSTEM MODELS
The system model consists of five different entities:-
Cloud Server
Group Manager
Group Member
Key Distribution
Revocation
MODULES
Registration
Login
Group Signature
File Upload
File Download
User Deletion
ALGORITHMS
1. Signature Generation
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
Besides, the designated group manager can reveal the identity of
the signature’s originator when a dispute occurs, which is
denoted as traceability.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:-
1. Let us consider private key (A,x) and system parameters as (P,U,V,H,W) where data is
referred as M.
2. Select random numbers , , r ,r, rx,ry,r1,r2 zq*.
3. Set 1=x and 2=x .
4. Now compute the following values as,
5. The first encryption set of values are as follows set C=f(M,T1,T2,T3,R1,R2,R3,R4,R5)
6. Now, consider another set of random numbers for further encryption process as
(C,C,Cx,C1,C2).
7. After the complete encryption process the result is =(T1,T2,T3,C,S,S,Sx,S1,S2).
ALGORITHMS Continue…
2. Signature Verification
Here user have to verify the group signature key and file key’s
with the triple DES decryption process.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:
1. Here the input parameters are (H0,H1,H2) and the group signature
=(T1,T2,T3,C,S,S,S2) and a set of revocation keys A1,....,Ar.
2. Here they set the temp file with the following set temp=e(T1,H1)e(T2,H2).
3. for i =1 to n
if e(T3-Ai,H0)=temp
4. Here if, it can get the two values are equal it returns a valid message and otherwise it
returns invalid message.
ALGORITHMS Continue…
3. Revocation Verification
User revocation is performed by the group manager via a
public available revocation list (RL), based on which group
members can encrypt their data files and ensure the confidentiality
against the revoked users.
Input: System parameter (P,U,V,H,W), M and a signature
Ϭ = (T1,T2,T3,c,sα,sβ,sx,sβ1,sβ2)
Output: True or False.
Steps:
1. Here the input is the encrypted form of the data which was generated in the Signature
generation process. The input parameters are System parameters(P,U,V,H,W),M and the
signature =(T1,T2,T3,C,S,S,Sx,S1,S 2).
2. Here they compute the following values.
3. After completing the generation of variables. I have to calculate the following function
f(M,T1,T2,T3,R1',R2',R3',R4',R5').
4. Here if the generated function is equals to the c (first encrypted result in encryption
process) then it returns the result as true otherwise it will show the result as false.
APPLICATIONS
 Data Confidentiality
 Access Control
 Anonymity and Traceability
 Efficiency
 Dynamic broadcast encryption is used.
 Authentication is done by Group signatures.
 Supports effective user repudiation and new user registration.
 Revocation can be attained without updating the private keys of
other users.
ADVANTAGES
Any user in the group can store and share data files with others by
the cloud.
The encryption complexity and size of cipher texts are
independent with the number of revoked users in the system.
User revocation can be achieved without updating the private keys
of the remaining users.
It provide the services as a low maintenance cost and high quality
services.
Save the investments data.
Maintain the data as a sensitive data without accessing any
unauthorized users.
CONCLUSION
This work designs a secure data sharing scheme, for dynamic
clusters in an untrusted cloud. A user is able to share data with
others in the group without revealing identity privacy to the cloud.
Additionally, it supports efficient user revocation and new user
joining. Moreover, the storage overhead and the encryption
computation cost are constant. Extensive analyses show that this
proposed scheme satisfies the desired security requirements and
guarantees efficiency as well.
FUTURE SCOPE
In future for solving the reliability and scalability issues we further
introduce the back-up group manager. In case of any failures of
group manager the back up group manager handles those problems.
So that the reliability and scalability increases.
REFERNCES
[1] Xuefeng Liu, Yuqing Zhang, BoyangWang, and Jingbo Yan "Mona: Secure Multi-
Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS VOL.
24, NO. 6, JUNE 2013.
[2] Kaiping Xue, Member, IEEE and Peilin Hong, Member, IEEE, A Dynamic Secure
Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud
Computing, vol. 2, No. 4, Oct-Dec 2014.
[3] K. Janardhan, M. Narendra "Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud", International Journal of Engineering Research and Applications
(IJERA), Jan.2015.
[4] Ameena Mehar , M.S.V.V. Ramesh, D.D.D.Suribabu “A CLOUD SECURITY
FRAMEWORK FOR DATA SHARING IN DYNAMIC GROUPS”, IJESR/October
2014/ Vol-4/Issue-10/652-658.
[5] M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the
Cloud ,IJARCET , Volume 2, Issue 6, June 2013.
[6] Hitesh S, P Ramesh Naidu "CLOUD SECURITY FRAMEWORK FOR MULTI-
OWNER DATA AUTHENTICATION", International Journal of Research In Science and
Engineering, Volume: 1 Special Issue: 2.
Thank You!!!!

More Related Content

What's hot

Encryption
EncryptionEncryption
Encryption
shyam Tirkey
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
Omkar Rane
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
Python and the internet of things
Python and the internet of thingsPython and the internet of things
Python and the internet of things
Adam Englander
 
Steganography wavelet
Steganography waveletSteganography wavelet
Steganography waveletSantu Chall
 
Iot for e-health system project concept
Iot for e-health system project conceptIot for e-health system project concept
Iot for e-health system project concept
Vakhtang Mosidze
 
De-anonymizing, Preserving and Democratizing Data Privacy and Ownership
De-anonymizing, Preserving and Democratizing Data Privacy and OwnershipDe-anonymizing, Preserving and Democratizing Data Privacy and Ownership
De-anonymizing, Preserving and Democratizing Data Privacy and Ownership
IIIT Hyderabad
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Steganography
SteganographySteganography
Steganography
Swapnil Bangera
 

What's hot (20)

Encryption
EncryptionEncryption
Encryption
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Python and the internet of things
Python and the internet of thingsPython and the internet of things
Python and the internet of things
 
Steganography wavelet
Steganography waveletSteganography wavelet
Steganography wavelet
 
Steganography
SteganographySteganography
Steganography
 
Iot for e-health system project concept
Iot for e-health system project conceptIot for e-health system project concept
Iot for e-health system project concept
 
De-anonymizing, Preserving and Democratizing Data Privacy and Ownership
De-anonymizing, Preserving and Democratizing Data Privacy and OwnershipDe-anonymizing, Preserving and Democratizing Data Privacy and Ownership
De-anonymizing, Preserving and Democratizing Data Privacy and Ownership
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Ninad Samel
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
Leila_maleke
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
 
Solar Air Conditioner
Solar Air ConditionerSolar Air Conditioner
Solar Air Conditionerskullcrusher
 

Viewers also liked (7)

A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
Solar Air Conditioner
Solar Air ConditionerSolar Air Conditioner
Solar Air Conditioner
 
Air conditioning system
Air conditioning systemAir conditioning system
Air conditioning system
 

Similar to Secure data sharing for dynamic groups in multi-owner using cloud

SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Krushna Panda
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALYEARSTUDENTPROJECT
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
paperpublications3
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupsSuchithra Balan
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Eswar Publications
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
IJERA Editor
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Kamal Spring
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IJERA Editor
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 

Similar to Secure data sharing for dynamic groups in multi-owner using cloud (20)

SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
secure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groupssecure multi-owner data sharing for dynamic groups
secure multi-owner data sharing for dynamic groups
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud Maintaining Data Integrity for Shared Data in Cloud
Maintaining Data Integrity for Shared Data in Cloud
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 

Recently uploaded

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Secure data sharing for dynamic groups in multi-owner using cloud

  • 1. DEPARTMENT OF COMPUTER ENGINEERING PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY, BAVDHAN,PUNE-411021 AY-2015-2016 A Seminar On “Secure Data Sharing For Dynamic Groups in Multi-Owner Using Cloud” By Mr. Sagar A. Dhanake Under guidance of Prof.V.S.Nandedkar
  • 2. CONTENTS . 1. Cloud Computing 2. Introduction 3. Motivation 4. Literature Survey 5. Problem Definition 6. System Architecture 7. System Models 8. Modules 9. Algorithms 10.Applications 11. Advantages 12. Conclusion 13. Future Scope 14. References
  • 3. Cloud Computing??? . Cloud computing is the access to computers and their functionality via the Internet or a local area network. Users of a cloud request this access from a set of web services that manage a pool of computing resources. The user cannot actually see or specify the physical location and organization of the equipment hosting the resources they are ultimately allowed to use. That is, the resources are drawn from a “cloud” of resources when they are granted to a user and returned to the cloud when they are released. A “cloud” is a set of machines and web services that implement cloud computing.
  • 4. INTRODUCTION . Cloud computing is providing the identity privacy as one of its obstacles without this user may not show interest to use the cloud systems. Here unconditional identity is giving a chance to privacy Problems. The data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users. It also maintains the revocation list that gives the information about the current group members. Changes of membership make secure data sharing highly difficult. Key management is also become difficult for every change of membership in the list. To solve the above challenging issues here introduced the MONA, Multi-owner data sharing-any one of the group member can securely share and store the data with others by the untrusted cloud.
  • 5. INTRODUCTION (Conti…) Dynamic group management-This scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. Secure sharing and privacy preserving access control to users is providing. So that when ever dispute occurs data owners real identities will be revealed by group manager. Also provide secure and privacy-preserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource. It can provide strict security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead.
  • 6. MOTIVATION Cloud computing is providing the basic characteristics such as low maintenance and resource sharing. In multiple-owner any one of the group member can share, store or modify the data. So that all the members can enjoy the storing and sharing of data across the cloud. A group signature scheme allows any member of the group to sign messages while keeping the identity secret from verifiers. User revocation is performed by the group manager via a public available revocation list (RL). To transmit encrypted data to a set of users so that only a privileged subset of users can decrypt the data.
  • 7. LITERATURE SURVEY SrNo Title Journal Description 1. A Dynamic Secure Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud Computing, vol. 2, No. 4, Oct-Dec 2014 In this paper proposed a dynamic secure group sharing framework in public cloud computing environment. 2. Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud IEEE Transactions on Parallel and Distributed Systems Vol. 24, NO. 6, June 2013 In this paper design a secure data sharing scheme, Mona, for dynamic groups in an untrusted cloud. 3 A Cloud Security Framework for Data Sharing in Dynamic Gruoups IJESR/October 2014/ Vol- 4/Issue-10/652-658. In this paper design a secure data sharing scheme, a user is able to share data with others in the group without revealing identity privacy to the cloud. 4 Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud IJERA, January 2015 In this paper user is able to share data with others in the group without revealing identity privacy to the cloud and supports efficient user revocation and new user joining.
  • 8. PROBLEM DEFINITION Problem Statement Secure multi-owner data sharing scheme, it implies that any user in the group can securely share data with others by the untrusted cloud. Support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners.
  • 10. SYSTEM MODELS The system model consists of five different entities:- Cloud Server Group Manager Group Member Key Distribution Revocation
  • 12. ALGORITHMS 1. Signature Generation A group signature scheme allows any member of the group to sign messages while keeping the identity secret from verifiers. Besides, the designated group manager can reveal the identity of the signature’s originator when a dispute occurs, which is denoted as traceability. Input: Private key (A,x), system parameter (P,U,V,H,W) and data M. Output: Generate a valid group signature on M. Steps:- 1. Let us consider private key (A,x) and system parameters as (P,U,V,H,W) where data is referred as M. 2. Select random numbers , , r ,r, rx,ry,r1,r2 zq*. 3. Set 1=x and 2=x . 4. Now compute the following values as, 5. The first encryption set of values are as follows set C=f(M,T1,T2,T3,R1,R2,R3,R4,R5) 6. Now, consider another set of random numbers for further encryption process as (C,C,Cx,C1,C2). 7. After the complete encryption process the result is =(T1,T2,T3,C,S,S,Sx,S1,S2).
  • 13. ALGORITHMS Continue… 2. Signature Verification Here user have to verify the group signature key and file key’s with the triple DES decryption process. Input: Private key (A,x), system parameter (P,U,V,H,W) and data M. Output: Generate a valid group signature on M. Steps: 1. Here the input parameters are (H0,H1,H2) and the group signature =(T1,T2,T3,C,S,S,S2) and a set of revocation keys A1,....,Ar. 2. Here they set the temp file with the following set temp=e(T1,H1)e(T2,H2). 3. for i =1 to n if e(T3-Ai,H0)=temp 4. Here if, it can get the two values are equal it returns a valid message and otherwise it returns invalid message.
  • 14. ALGORITHMS Continue… 3. Revocation Verification User revocation is performed by the group manager via a public available revocation list (RL), based on which group members can encrypt their data files and ensure the confidentiality against the revoked users. Input: System parameter (P,U,V,H,W), M and a signature Ϭ = (T1,T2,T3,c,sα,sβ,sx,sβ1,sβ2) Output: True or False. Steps: 1. Here the input is the encrypted form of the data which was generated in the Signature generation process. The input parameters are System parameters(P,U,V,H,W),M and the signature =(T1,T2,T3,C,S,S,Sx,S1,S 2). 2. Here they compute the following values. 3. After completing the generation of variables. I have to calculate the following function f(M,T1,T2,T3,R1',R2',R3',R4',R5'). 4. Here if the generated function is equals to the c (first encrypted result in encryption process) then it returns the result as true otherwise it will show the result as false.
  • 15. APPLICATIONS  Data Confidentiality  Access Control  Anonymity and Traceability  Efficiency  Dynamic broadcast encryption is used.  Authentication is done by Group signatures.  Supports effective user repudiation and new user registration.  Revocation can be attained without updating the private keys of other users.
  • 16. ADVANTAGES Any user in the group can store and share data files with others by the cloud. The encryption complexity and size of cipher texts are independent with the number of revoked users in the system. User revocation can be achieved without updating the private keys of the remaining users. It provide the services as a low maintenance cost and high quality services. Save the investments data. Maintain the data as a sensitive data without accessing any unauthorized users.
  • 17. CONCLUSION This work designs a secure data sharing scheme, for dynamic clusters in an untrusted cloud. A user is able to share data with others in the group without revealing identity privacy to the cloud. Additionally, it supports efficient user revocation and new user joining. Moreover, the storage overhead and the encryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements and guarantees efficiency as well.
  • 18. FUTURE SCOPE In future for solving the reliability and scalability issues we further introduce the back-up group manager. In case of any failures of group manager the back up group manager handles those problems. So that the reliability and scalability increases.
  • 19. REFERNCES [1] Xuefeng Liu, Yuqing Zhang, BoyangWang, and Jingbo Yan "Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS VOL. 24, NO. 6, JUNE 2013. [2] Kaiping Xue, Member, IEEE and Peilin Hong, Member, IEEE, A Dynamic Secure Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud Computing, vol. 2, No. 4, Oct-Dec 2014. [3] K. Janardhan, M. Narendra "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud", International Journal of Engineering Research and Applications (IJERA), Jan.2015. [4] Ameena Mehar , M.S.V.V. Ramesh, D.D.D.Suribabu “A CLOUD SECURITY FRAMEWORK FOR DATA SHARING IN DYNAMIC GROUPS”, IJESR/October 2014/ Vol-4/Issue-10/652-658. [5] M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the Cloud ,IJARCET , Volume 2, Issue 6, June 2013. [6] Hitesh S, P Ramesh Naidu "CLOUD SECURITY FRAMEWORK FOR MULTI- OWNER DATA AUTHENTICATION", International Journal of Research In Science and Engineering, Volume: 1 Special Issue: 2.