This document summarizes a seminar presentation on secure data sharing for dynamic groups in multi-owner cloud environments. The presentation covered cloud computing fundamentals and challenges with identity privacy. It proposed a system called MONA that allows any group member to securely store and share encrypted data files on an untrusted cloud. Key features of MONA include dynamic group management such that new users can access previous data, anonymous yet traceable access control, and efficient user revocation. The presentation discussed the system architecture, models, modules including registration, login and file sharing, relevant algorithms, applications, advantages, and future work concerning reliability.
This is the final presentation for project named "Audio Steganography" for btech final year computer science students, and without the screenshots of the progress this can b used as a synopsis presentation.
My keynote at 1st International Workshop on Social Multimedia Computing (SMC), Melbourne, Australia, 9 July 2012.
see: http://www.icme2012.org or
http://smc2012.idm.pku.edu.cn/
This is the final presentation for project named "Audio Steganography" for btech final year computer science students, and without the screenshots of the progress this can b used as a synopsis presentation.
My keynote at 1st International Workshop on Social Multimedia Computing (SMC), Melbourne, Australia, 9 July 2012.
see: http://www.icme2012.org or
http://smc2012.idm.pku.edu.cn/
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
De-anonymizing, Preserving and Democratizing Data Privacy and OwnershipIIIT Hyderabad
The fourth industrial revolution warrants a rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and intelligent automation. It brings a dire necessity for data collection at a large scale. The organizations responsible for shepherding the technology to the next level rely on data-hungry algorithms developed due to the advancements in machine learning and deep learning in the last decade. Often, the collected data include personally identifiable information (PII) and pseudo identifiers like age, gender, zip codes, and non-PII attributes. Due to the inclusion of PII attributes, data protection and clearly defining its ownership has become paramount. Despite having several compliances in place like the Health Insurance Portability and Accountability Act (HIPAA) and the National Data Health Mission (NDHM) for healthcare, or the more comprehensive General Data Protection Regulation (GDPR), we witness wrongful disclosure, theft and misuse of data by the organizations that are supposed to be the torchbearers into the new era of technology. Apart from external attacks and breaches, many organizations tend to find workarounds and not follow the data privacy standards governed by laws across the globe. The malpractices like selling data to third parties, using weaker anonymizations, and claiming ownership of data often lead to the loss of sensitive information that directly impacts the people whose data is collected and mishandled in the name of providing services.
Researchers who tried to find a solution to the data misuse problem developed anonymization techniques. However, these techniques like k-anonymity, l-diversity, t-closeness, etc., are proven to be weak and vulnerable by privacy researchers. They have applied cross-linking techniques to de-anonymize i) patients using electronic health records and other public records, ii) American query logs to conclude that 87% of the American population can be uniquely identified by knowing pseudo identifiers like age, gender, and zip codes. As part of our research, we present a cross-linking attack to identify personal identifiable information (PII), including address, family details, voter ID information with just the Twitter username, and publicly available electoral rolls. We further show how academic institutions employ weaker anonymizations to release students’ information, making them vulnerable to cross-linking attacks.
Several anonymized data releases failed due to cross-linking vulnerabilities it carries. We will now discuss differential privacy and how it curbs the limitations of anonymization algorithms. Differential privacy (DP) is a system for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals. Unlike anonymization, where we reveal the actual individual samples, DP adds noise in a manner such that individual data samples
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
De-anonymizing, Preserving and Democratizing Data Privacy and OwnershipIIIT Hyderabad
The fourth industrial revolution warrants a rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and intelligent automation. It brings a dire necessity for data collection at a large scale. The organizations responsible for shepherding the technology to the next level rely on data-hungry algorithms developed due to the advancements in machine learning and deep learning in the last decade. Often, the collected data include personally identifiable information (PII) and pseudo identifiers like age, gender, zip codes, and non-PII attributes. Due to the inclusion of PII attributes, data protection and clearly defining its ownership has become paramount. Despite having several compliances in place like the Health Insurance Portability and Accountability Act (HIPAA) and the National Data Health Mission (NDHM) for healthcare, or the more comprehensive General Data Protection Regulation (GDPR), we witness wrongful disclosure, theft and misuse of data by the organizations that are supposed to be the torchbearers into the new era of technology. Apart from external attacks and breaches, many organizations tend to find workarounds and not follow the data privacy standards governed by laws across the globe. The malpractices like selling data to third parties, using weaker anonymizations, and claiming ownership of data often lead to the loss of sensitive information that directly impacts the people whose data is collected and mishandled in the name of providing services.
Researchers who tried to find a solution to the data misuse problem developed anonymization techniques. However, these techniques like k-anonymity, l-diversity, t-closeness, etc., are proven to be weak and vulnerable by privacy researchers. They have applied cross-linking techniques to de-anonymize i) patients using electronic health records and other public records, ii) American query logs to conclude that 87% of the American population can be uniquely identified by knowing pseudo identifiers like age, gender, and zip codes. As part of our research, we present a cross-linking attack to identify personal identifiable information (PII), including address, family details, voter ID information with just the Twitter username, and publicly available electoral rolls. We further show how academic institutions employ weaker anonymizations to release students’ information, making them vulnerable to cross-linking attacks.
Several anonymized data releases failed due to cross-linking vulnerabilities it carries. We will now discuss differential privacy and how it curbs the limitations of anonymization algorithms. Differential privacy (DP) is a system for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals. Unlike anonymization, where we reveal the actual individual samples, DP adds noise in a manner such that individual data samples
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
Abstract: Cloud computing provides an economical and efficient solution for sharing data among the cloud users in the group , users sharing data in a multi-attorney manner preserving data and identity privacy from an untrusted cloud, it is still a challenging issue, due to frequent change of the membership in the group. In this paper, we propose a multi-attorney data sharing scheme for the dynamic groups in the cloud. By combing group signature and Tripple DES encryption techniques, any cloud user anonymously share the data with others. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.Keywords: cloud computing, data sharing, privacy-preserving, access control, and dynamic groups.
Title: Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Author: Vijaya Kumar Patil C, Manjunath H
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the
remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.
Maintaining Data Integrity for Shared Data in Cloud IJERA Editor
Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle the applications. User can easily modify the shared and stored data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When user misbehaves or misuses the system the admin has authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
The continuous development of cloud computing,seve ral trends are opening up to new forms of outsourci ng. Public data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion attack and provide an efficient public integrity au diting scheme,with the help of secure group user r evocation based on vector commitment and verifier�local revocation group signature. It provides secure and efficient s cheme which support public checking and efficient user revocati on. Problem of existing work they used TPA (Third p arty auditor) for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we are working with cloud,user identity is major conc ern because user doesn�t want to reveal his persona l information to public. This concept not included in it. In this paper,based these con�s we proposed a dynamic dat a sharing in public cloud using multi-authority system. The prop osed scheme is able to protect user�s privacy again st each single authority. .
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Secure data sharing for dynamic groups in multi-owner using cloud
1. DEPARTMENT OF COMPUTER ENGINEERING
PADMABHOOSHAN VASANTDADA PATIL INSTITUTE OF TECHNOLOGY,
BAVDHAN,PUNE-411021
AY-2015-2016
A Seminar
On
“Secure Data Sharing For Dynamic Groups in Multi-Owner Using Cloud”
By
Mr. Sagar A. Dhanake
Under guidance of
Prof.V.S.Nandedkar
2. CONTENTS
.
1. Cloud Computing
2. Introduction
3. Motivation
4. Literature Survey
5. Problem Definition
6. System Architecture
7. System Models
8. Modules
9. Algorithms
10.Applications
11. Advantages
12. Conclusion
13. Future Scope
14. References
3. Cloud Computing???
.
Cloud computing is the access to computers and their functionality
via the Internet or a local area network. Users of a cloud request this
access from a set of web services that manage a pool of computing
resources.
The user cannot actually see or specify the physical location and
organization of the equipment hosting the resources they are
ultimately allowed to use. That is, the resources are drawn from a
“cloud” of resources when they are granted to a user and returned to
the cloud when they are released.
A “cloud” is a set of machines and web services that implement
cloud computing.
4. INTRODUCTION
.
Cloud computing is providing the identity privacy as one of its
obstacles without this user may not show interest to use the cloud
systems. Here unconditional identity is giving a chance to privacy
Problems.
The data owners store the encrypted data files in untrusted storage
and distribute the corresponding decryption keys only to authorized
users.
It also maintains the revocation list that gives the information
about the current group members. Changes of membership make
secure data sharing highly difficult. Key management is also become
difficult for every change of membership in the list.
To solve the above challenging issues here introduced the MONA,
Multi-owner data sharing-any one of the group member can securely
share and store the data with others by the untrusted cloud.
5. INTRODUCTION (Conti…)
Dynamic group management-This scheme is able to support
dynamic groups efficiently. Specifically, new granted users can
directly decrypt data files uploaded before their participation
without contacting with data owners.
Secure sharing and privacy preserving access control to users
is providing. So that when ever dispute occurs data owners real
identities will be revealed by group manager.
Also provide secure and privacy-preserving access control to
users, which guarantees any member in a group to anonymously
utilize the cloud resource.
It can provide strict security analysis, and perform extensive
simulations to demonstrate the efficiency of our scheme in terms
of storage and computation overhead.
6. MOTIVATION
Cloud computing is providing the basic characteristics such as
low maintenance and resource sharing.
In multiple-owner any one of the group member can share,
store or modify the data. So that all the members can enjoy the
storing and sharing of data across the cloud.
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
User revocation is performed by the group manager via a
public available revocation list (RL).
To transmit encrypted data to a set of users so that only a
privileged subset of users can decrypt the data.
7. LITERATURE SURVEY
SrNo Title Journal Description
1. A Dynamic
Secure Group Sharing
Framework in Public
Cloud Computing
IEEE Transactions on Cloud
Computing, vol. 2, No. 4,
Oct-Dec 2014
In this paper proposed a
dynamic secure group sharing
framework in public cloud
computing environment.
2. Mona: Secure Multi-
Owner Data Sharing
for Dynamic Groups in
the Cloud
IEEE Transactions on
Parallel and Distributed
Systems Vol. 24, NO. 6,
June 2013
In this paper design a secure
data sharing scheme, Mona, for
dynamic groups in an untrusted
cloud.
3 A Cloud Security
Framework for Data
Sharing in Dynamic
Gruoups
IJESR/October 2014/ Vol-
4/Issue-10/652-658.
In this paper design a secure
data sharing scheme, a user is
able to share data with others in
the group without revealing
identity privacy to the cloud.
4 Mona: Secure Multi-
Owner Data
Sharing for Dynamic
Groups in the Cloud
IJERA, January 2015 In this paper user is able to
share data with others in the
group without revealing
identity privacy to the cloud
and supports efficient user
revocation and new user
joining.
8. PROBLEM DEFINITION
Problem Statement
Secure multi-owner data sharing scheme, it implies that any user
in the group can securely share data with others by the untrusted
cloud. Support dynamic groups efficiently. Specifically, new
granted users can directly decrypt data files uploaded before
their participation without contacting with data owners.
12. ALGORITHMS
1. Signature Generation
A group signature scheme allows any member of the group to
sign messages while keeping the identity secret from verifiers.
Besides, the designated group manager can reveal the identity of
the signature’s originator when a dispute occurs, which is
denoted as traceability.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:-
1. Let us consider private key (A,x) and system parameters as (P,U,V,H,W) where data is
referred as M.
2. Select random numbers , , r ,r, rx,ry,r1,r2 zq*.
3. Set 1=x and 2=x .
4. Now compute the following values as,
5. The first encryption set of values are as follows set C=f(M,T1,T2,T3,R1,R2,R3,R4,R5)
6. Now, consider another set of random numbers for further encryption process as
(C,C,Cx,C1,C2).
7. After the complete encryption process the result is =(T1,T2,T3,C,S,S,Sx,S1,S2).
13. ALGORITHMS Continue…
2. Signature Verification
Here user have to verify the group signature key and file key’s
with the triple DES decryption process.
Input: Private key (A,x), system parameter (P,U,V,H,W) and data M.
Output: Generate a valid group signature on M.
Steps:
1. Here the input parameters are (H0,H1,H2) and the group signature
=(T1,T2,T3,C,S,S,S2) and a set of revocation keys A1,....,Ar.
2. Here they set the temp file with the following set temp=e(T1,H1)e(T2,H2).
3. for i =1 to n
if e(T3-Ai,H0)=temp
4. Here if, it can get the two values are equal it returns a valid message and otherwise it
returns invalid message.
14. ALGORITHMS Continue…
3. Revocation Verification
User revocation is performed by the group manager via a
public available revocation list (RL), based on which group
members can encrypt their data files and ensure the confidentiality
against the revoked users.
Input: System parameter (P,U,V,H,W), M and a signature
Ϭ = (T1,T2,T3,c,sα,sβ,sx,sβ1,sβ2)
Output: True or False.
Steps:
1. Here the input is the encrypted form of the data which was generated in the Signature
generation process. The input parameters are System parameters(P,U,V,H,W),M and the
signature =(T1,T2,T3,C,S,S,Sx,S1,S 2).
2. Here they compute the following values.
3. After completing the generation of variables. I have to calculate the following function
f(M,T1,T2,T3,R1',R2',R3',R4',R5').
4. Here if the generated function is equals to the c (first encrypted result in encryption
process) then it returns the result as true otherwise it will show the result as false.
15. APPLICATIONS
Data Confidentiality
Access Control
Anonymity and Traceability
Efficiency
Dynamic broadcast encryption is used.
Authentication is done by Group signatures.
Supports effective user repudiation and new user registration.
Revocation can be attained without updating the private keys of
other users.
16. ADVANTAGES
Any user in the group can store and share data files with others by
the cloud.
The encryption complexity and size of cipher texts are
independent with the number of revoked users in the system.
User revocation can be achieved without updating the private keys
of the remaining users.
It provide the services as a low maintenance cost and high quality
services.
Save the investments data.
Maintain the data as a sensitive data without accessing any
unauthorized users.
17. CONCLUSION
This work designs a secure data sharing scheme, for dynamic
clusters in an untrusted cloud. A user is able to share data with
others in the group without revealing identity privacy to the cloud.
Additionally, it supports efficient user revocation and new user
joining. Moreover, the storage overhead and the encryption
computation cost are constant. Extensive analyses show that this
proposed scheme satisfies the desired security requirements and
guarantees efficiency as well.
18. FUTURE SCOPE
In future for solving the reliability and scalability issues we further
introduce the back-up group manager. In case of any failures of
group manager the back up group manager handles those problems.
So that the reliability and scalability increases.
19. REFERNCES
[1] Xuefeng Liu, Yuqing Zhang, BoyangWang, and Jingbo Yan "Mona: Secure Multi-
Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS VOL.
24, NO. 6, JUNE 2013.
[2] Kaiping Xue, Member, IEEE and Peilin Hong, Member, IEEE, A Dynamic Secure
Group Sharing Framework in Public Cloud Computing IEEE Transactions on Cloud
Computing, vol. 2, No. 4, Oct-Dec 2014.
[3] K. Janardhan, M. Narendra "Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud", International Journal of Engineering Research and Applications
(IJERA), Jan.2015.
[4] Ameena Mehar , M.S.V.V. Ramesh, D.D.D.Suribabu “A CLOUD SECURITY
FRAMEWORK FOR DATA SHARING IN DYNAMIC GROUPS”, IJESR/October
2014/ Vol-4/Issue-10/652-658.
[5] M. Kavitha Margret, Secure Policy Based Data Sharing for Dynamic Groups in the
Cloud ,IJARCET , Volume 2, Issue 6, June 2013.
[6] Hitesh S, P Ramesh Naidu "CLOUD SECURITY FRAMEWORK FOR MULTI-
OWNER DATA AUTHENTICATION", International Journal of Research In Science and
Engineering, Volume: 1 Special Issue: 2.