The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
Any user in a dynamic group can anonymously share data on the cloud using Mona, a secure multi-owner data sharing scheme. Mona leverages group signatures and dynamic broadcast encryption so that the storage overhead and encryption costs are independent of the number of revoked users. It allows efficient user revocation without updating others' secret keys and new users can access previously shared data. Mona provides anonymity, access control, and traces misbehavior. It achieves efficient and secure data sharing for dynamic groups on an untrusted cloud.
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
1) The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona allows any user in a group to anonymously share data with others using techniques like group signatures and dynamic broadcast encryption.
2) Mona supports efficient membership changes without updating secret keys. New users can decrypt pre-existing files and revoking users does not require updating keys of remaining users.
3) Mona provides privacy-preserving access control where users can anonymously access cloud resources while allowing identity tracing by the group manager when needed. It aims to achieve secure and flexible data sharing for dynamic groups in the cloud.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
The document discusses secure multi-owner data sharing for dynamic groups in clouds. It outlines Mona, a scheme that uses dynamic broadcast encryption for access control and group signatures for authentication. Mona allows efficient revocation without updating other users' keys and supports anonymity and traceability. The document compares Mona to other schemes and finds Mona addresses issues around identity privacy and revocation more effectively. Future work aims to make Mona more reliable and scalable by handling failures of the group manager.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
This document summarizes a seminar presentation on secure data sharing for dynamic groups in multi-owner cloud environments. The presentation covered cloud computing fundamentals and challenges with identity privacy. It proposed a system called MONA that allows any group member to securely store and share encrypted data files on an untrusted cloud. Key features of MONA include dynamic group management such that new users can access previous data, anonymous yet traceable access control, and efficient user revocation. The presentation discussed the system architecture, models, modules including registration, login and file sharing, relevant algorithms, applications, advantages, and future work concerning reliability.
The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona leverages group signature and dynamic broadcast encryption techniques to allow any cloud user to anonymously share data with others. It supports efficient dynamic groups where new users can access previously shared data without contacting owners. Mona provides secure access control and privacy preservation for group members while storing data on untrusted cloud storage. It aims to address limitations of existing schemes regarding user participation, revocation, and single data owner restrictions.
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
Any user in a dynamic group can anonymously share data on the cloud using Mona, a secure multi-owner data sharing scheme. Mona leverages group signatures and dynamic broadcast encryption so that the storage overhead and encryption costs are independent of the number of revoked users. It allows efficient user revocation without updating others' secret keys and new users can access previously shared data. Mona provides anonymity, access control, and traces misbehavior. It achieves efficient and secure data sharing for dynamic groups on an untrusted cloud.
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
1) The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona allows any user in a group to anonymously share data with others using techniques like group signatures and dynamic broadcast encryption.
2) Mona supports efficient membership changes without updating secret keys. New users can decrypt pre-existing files and revoking users does not require updating keys of remaining users.
3) Mona provides privacy-preserving access control where users can anonymously access cloud resources while allowing identity tracing by the group manager when needed. It aims to achieve secure and flexible data sharing for dynamic groups in the cloud.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudShruthi Suresh
The document discusses secure multi-owner data sharing for dynamic groups in clouds. It outlines Mona, a scheme that uses dynamic broadcast encryption for access control and group signatures for authentication. Mona allows efficient revocation without updating other users' keys and supports anonymity and traceability. The document compares Mona to other schemes and finds Mona addresses issues around identity privacy and revocation more effectively. Future work aims to make Mona more reliable and scalable by handling failures of the group manager.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
This document summarizes a seminar presentation on secure data sharing for dynamic groups in multi-owner cloud environments. The presentation covered cloud computing fundamentals and challenges with identity privacy. It proposed a system called MONA that allows any group member to securely store and share encrypted data files on an untrusted cloud. Key features of MONA include dynamic group management such that new users can access previous data, anonymous yet traceable access control, and efficient user revocation. The presentation discussed the system architecture, models, modules including registration, login and file sharing, relevant algorithms, applications, advantages, and future work concerning reliability.
The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona leverages group signature and dynamic broadcast encryption techniques to allow any cloud user to anonymously share data with others. It supports efficient dynamic groups where new users can access previously shared data without contacting owners. Mona provides secure access control and privacy preservation for group members while storing data on untrusted cloud storage. It aims to address limitations of existing schemes regarding user participation, revocation, and single data owner restrictions.
secure multi-owner data sharing for dynamic groupsSuchithra Balan
The document presents a secure data sharing scheme for dynamic groups in cloud computing. The scheme leverages group signature and dynamic broadcast encryption techniques to allow cloud users to anonymously share data with others in a group while preserving identity privacy from an untrusted cloud. It aims to securely support data sharing in dynamic groups where attributes are not fixed and multiple owners are possible. The scheme's storage overhead and encryption costs are independent of the number of revoked users.
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
This document proposes a secure data sharing scheme for dynamic groups in the cloud. It allows group members to securely access and share data files stored in the cloud. The scheme provides secure key distribution without requiring secure communication channels. It also enables fine-grained access control and prevents collusion attacks between revoked users and the cloud. When users join or leave the group, other users do not need to update their private keys. The scheme aims to address limitations of existing approaches that require updating file-block keys for revocations and have overhead linearly increasing with member/revocation changes.
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...JAYAPRAKASH JPINFOTECH
This document proposes a scheme for secure data sharing and conditional dissemination with multiple owners in cloud computing. The scheme allows data owners to share private data with groups via the cloud, and for data disseminators to share that data with new groups if access policies are met. It also presents a multiparty access control mechanism where co-owners can add new access policies due to privacy preferences, and provides strategies to resolve conflicts from different policies.
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
Abstract: Cloud computing provides an economical and efficient solution for sharing data among the cloud users in the group , users sharing data in a multi-attorney manner preserving data and identity privacy from an untrusted cloud, it is still a challenging issue, due to frequent change of the membership in the group. In this paper, we propose a multi-attorney data sharing scheme for the dynamic groups in the cloud. By combing group signature and Tripple DES encryption techniques, any cloud user anonymously share the data with others. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.Keywords: cloud computing, data sharing, privacy-preserving, access control, and dynamic groups.
Title: Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Author: Vijaya Kumar Patil C, Manjunath H
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
The document proposes a shared authority based privacy-preserving authentication protocol (SAPA) for cloud data storage. SAPA allows for authentication and authorization without compromising a user's private information. It addresses privacy issues during data sharing in cloud storage by implementing an anonymous access request matching mechanism and applying attribute-based access control with proxy re-encryption for temporary authorized data sharing between users. The proposed system provides advantages over existing systems by allowing data owners to control access and sharing privileges while preserving user privacy during authentication and authorization.
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. The scheme allows any user within a group to securely share data with others through a trusted cloud. It supports efficient dynamic groups where new users can directly access and modify files uploaded before their participation without contacting owners. User revocation is achieved through a public revocation list without changing remaining user keys. The scheme provides anonymity and security while ensuring storage and computation overhead remain constant regardless of revoked users. It aims to address challenges with existing systems through increasing redundancy of group managers and distributing workload across managers.
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
This document summarizes the "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud" paper. It proposes a scheme called Mona that allows any user in a dynamic group to anonymously share data on the cloud. Mona uses group signatures and dynamic broadcast encryption so encryption costs are independent of revoked users. It provides anonymous yet traceable access control and efficient user revocation without updating keys.
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. It allows any user in a group to securely store and share data with others in the cloud. The key contributions are:
1) Any user can store and share data files with others through the cloud in a multi-owner manner.
2) The computation overhead and ciphertext size are constant and independent of the number of revoked users.
3) User revocation can be achieved without updating remaining users' private keys.
4) New users can directly decrypt files stored before their participation.
The proposed scheme uses group signatures for anonymous authentication and dynamic broadcast encryption for secure data sharing. It aims to address challenges like
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona allows any user in a group to anonymously share data with others in the cloud using group signatures and dynamic broadcast encryption. It aims to address challenges with existing schemes that have complexities increasing linearly with the number of owners and revoked users. The proposed Mona scheme achieves independent storage overhead and encryption costs from the number of revoked users and supports dynamic groups where new users can access previous files without owners.
This document proposes a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. It aims to enable secure data sharing in dynamic groups where there is no fixed attribute authority, using a key policy attribute-based encryption method to select dynamic attribute authorities. The proposed scheme uses group signatures, signed receipts, and dynamic broadcast encryption to allow cloud users to anonymously share data. It reduces computation cost and storage overhead compared to existing works, as the encryption computation cost and storage overhead are independent of the number of revoked users.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
The document proposes a secure group data sharing scheme on cloud using key aggregate search encryption (KASE). In the proposed scheme, a data owner can generate a single download token (DT) to share a group of encrypted files with multiple users. The users only need to upload the DT to the cloud to search and download the shared files. This reduces the complexity of managing multiple encryption keys compared to traditional schemes. The scheme provides security, dynamic changes, low computation and communication costs for file access and key updates.
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
This document proposes a shared authority based privacy-preserving authentication protocol (SAPA) for cloud storage. SAPA allows for anonymous access requests and attribute-based access control, while encrypting data to preserve privacy. It aims to address privacy issues when a user requests data sharing from other users and the cloud server, where the request itself could reveal private information. The protocol uses anonymous matching of access requests, encryption of data, and temporary authorized data sharing between users through proxy re-encryption. It is designed to simultaneously provide access control, sharing of access authority, and privacy preservation for collaborative cloud applications.
The capability of involving the selection sharing encrypted data with different users via public
cloud storage may greatly ease security concerns over not intended data leaks in the cloud. A key
challenge to designing such encryption schemes to be sustainable in the efficient management of
encryption keys. The desired flexibility of sharing any group of selected documents with any group of
users need for something different encryption keys to be used for different documents. However, this
also implies the urgent need of securely distributing to users a large number of keys for both encryption
and search, and those users will have to protected from danger store the received keys, and submit an
equally large number of keyword trapdoors to the cloud in order to perform search over the shared data
implied need for secure communication, storage, and complexity clearly to give to someone the
approach impractical. In this work a data owner only needs to distribute a single key to a user for
sharing a very large number of documents, and the user only needs to submit a single trapdoor to the
cloud for querying the shared documents. User Revocation is used for Key Updation. Forward Secrecy
and Backward Secrecy is used.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
secure multi-owner data sharing for dynamic groupsSuchithra Balan
The document presents a secure data sharing scheme for dynamic groups in cloud computing. The scheme leverages group signature and dynamic broadcast encryption techniques to allow cloud users to anonymously share data with others in a group while preserving identity privacy from an untrusted cloud. It aims to securely support data sharing in dynamic groups where attributes are not fixed and multiple owners are possible. The scheme's storage overhead and encryption costs are independent of the number of revoked users.
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
This document proposes a secure data sharing scheme for dynamic groups in the cloud. It allows group members to securely access and share data files stored in the cloud. The scheme provides secure key distribution without requiring secure communication channels. It also enables fine-grained access control and prevents collusion attacks between revoked users and the cloud. When users join or leave the group, other users do not need to update their private keys. The scheme aims to address limitations of existing approaches that require updating file-block keys for revocations and have overhead linearly increasing with member/revocation changes.
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...JAYAPRAKASH JPINFOTECH
This document proposes a scheme for secure data sharing and conditional dissemination with multiple owners in cloud computing. The scheme allows data owners to share private data with groups via the cloud, and for data disseminators to share that data with new groups if access policies are met. It also presents a multiparty access control mechanism where co-owners can add new access policies due to privacy preferences, and provides strategies to resolve conflicts from different policies.
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloudpaperpublications3
Abstract: Cloud computing provides an economical and efficient solution for sharing data among the cloud users in the group , users sharing data in a multi-attorney manner preserving data and identity privacy from an untrusted cloud, it is still a challenging issue, due to frequent change of the membership in the group. In this paper, we propose a multi-attorney data sharing scheme for the dynamic groups in the cloud. By combing group signature and Tripple DES encryption techniques, any cloud user anonymously share the data with others. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.Keywords: cloud computing, data sharing, privacy-preserving, access control, and dynamic groups.
Title: Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Author: Vijaya Kumar Patil C, Manjunath H
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
The document proposes a shared authority based privacy-preserving authentication protocol (SAPA) for cloud data storage. SAPA allows for authentication and authorization without compromising a user's private information. It addresses privacy issues during data sharing in cloud storage by implementing an anonymous access request matching mechanism and applying attribute-based access control with proxy re-encryption for temporary authorized data sharing between users. The proposed system provides advantages over existing systems by allowing data owners to control access and sharing privileges while preserving user privacy during authentication and authorization.
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. The scheme allows any user within a group to securely share data with others through a trusted cloud. It supports efficient dynamic groups where new users can directly access and modify files uploaded before their participation without contacting owners. User revocation is achieved through a public revocation list without changing remaining user keys. The scheme provides anonymity and security while ensuring storage and computation overhead remain constant regardless of revoked users. It aims to address challenges with existing systems through increasing redundancy of group managers and distributing workload across managers.
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
This document summarizes the "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud" paper. It proposes a scheme called Mona that allows any user in a dynamic group to anonymously share data on the cloud. Mona uses group signatures and dynamic broadcast encryption so encryption costs are independent of revoked users. It provides anonymous yet traceable access control and efficient user revocation without updating keys.
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
This document proposes a secure multi-owner data sharing scheme for dynamic groups in the cloud. It allows any user in a group to securely store and share data with others in the cloud. The key contributions are:
1) Any user can store and share data files with others through the cloud in a multi-owner manner.
2) The computation overhead and ciphertext size are constant and independent of the number of revoked users.
3) User revocation can be achieved without updating remaining users' private keys.
4) New users can directly decrypt files stored before their participation.
The proposed scheme uses group signatures for anonymous authentication and dynamic broadcast encryption for secure data sharing. It aims to address challenges like
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
The document proposes a secure multi-owner data sharing scheme called Mona for dynamic groups in the cloud. Mona allows any user in a group to anonymously share data with others in the cloud using group signatures and dynamic broadcast encryption. It aims to address challenges with existing schemes that have complexities increasing linearly with the number of owners and revoked users. The proposed Mona scheme achieves independent storage overhead and encryption costs from the number of revoked users and supports dynamic groups where new users can access previous files without owners.
This document proposes a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. It aims to enable secure data sharing in dynamic groups where there is no fixed attribute authority, using a key policy attribute-based encryption method to select dynamic attribute authorities. The proposed scheme uses group signatures, signed receipts, and dynamic broadcast encryption to allow cloud users to anonymously share data. It reduces computation cost and storage overhead compared to existing works, as the encryption computation cost and storage overhead are independent of the number of revoked users.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
Abstract Cloud computing provides much-known services for storing user data over cloud server and it provides attention towards a broad set of technologies, rules and controls deployed to provide security for applications and data. As the more and more firm uses the cloud, security in cloud environment is becoming very important issue. It is much needed that companies should work with partners doing best practices of cloud security and which facilitate transparency for their solutions. Number of security solutions today depends on the authentication for security but it did not provide solution for the privacy problems while sharing data in the cloud environment. Data access request from the user itself may expose users’ private data no matter his request approved or not. So this becomes very important in sharing data in the cloud environment. In this paper we proposed a system which provides attention towards the above mentioned problem. In proposed system we used the concept of data anonymity for sending data access request to data owner and also provide the data auditing facility to detect fraud in the integrity of users shared data. Keywords: Cloud computing, privacy preservation, data integrity, data sharing, authentication
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
The document proposes a secure group data sharing scheme on cloud using key aggregate search encryption (KASE). In the proposed scheme, a data owner can generate a single download token (DT) to share a group of encrypted files with multiple users. The users only need to upload the DT to the cloud to search and download the shared files. This reduces the complexity of managing multiple encryption keys compared to traditional schemes. The scheme provides security, dynamic changes, low computation and communication costs for file access and key updates.
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
This document proposes a shared authority based privacy-preserving authentication protocol (SAPA) for cloud storage. SAPA allows for anonymous access requests and attribute-based access control, while encrypting data to preserve privacy. It aims to address privacy issues when a user requests data sharing from other users and the cloud server, where the request itself could reveal private information. The protocol uses anonymous matching of access requests, encryption of data, and temporary authorized data sharing between users through proxy re-encryption. It is designed to simultaneously provide access control, sharing of access authority, and privacy preservation for collaborative cloud applications.
The capability of involving the selection sharing encrypted data with different users via public
cloud storage may greatly ease security concerns over not intended data leaks in the cloud. A key
challenge to designing such encryption schemes to be sustainable in the efficient management of
encryption keys. The desired flexibility of sharing any group of selected documents with any group of
users need for something different encryption keys to be used for different documents. However, this
also implies the urgent need of securely distributing to users a large number of keys for both encryption
and search, and those users will have to protected from danger store the received keys, and submit an
equally large number of keyword trapdoors to the cloud in order to perform search over the shared data
implied need for secure communication, storage, and complexity clearly to give to someone the
approach impractical. In this work a data owner only needs to distribute a single key to a user for
sharing a very large number of documents, and the user only needs to submit a single trapdoor to the
cloud for querying the shared documents. User Revocation is used for Key Updation. Forward Secrecy
and Backward Secrecy is used.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the
remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.
This summarizes a research paper about an encryption-based secure data sharing and storage scheme for multi-user dynamic groups in the cloud. The proposed scheme leverages group signatures and dynamic broadcast encryption to allow any cloud user to anonymously share data while preserving identity privacy. It ensures storage overhead and encryption costs are independent of the number of users. The scheme provides security analysis and experiments demonstrating efficiency.
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
This summary provides the key details from the document in 3 sentences:
The document proposes a secure multi-owner data sharing scheme for dynamic groups in cloud computing. The scheme allows any user in a group to securely store and share data files with others through the untrusted cloud. It uses techniques like group signature and dynamic broadcast encryption to provide anonymous access control while enabling the group manager to trace real identities when needed, and allows efficient user revocation and participation of new users.
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
Service Providers can grow their business by selling our cloud authentication service that can be fully branded
to the Service Provider or if required a Service. The proposed enhanced decentralized access control scheme for
secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before storing data. The scheme also has the
added feature of access control in which only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data stored in the cloud. It addresses
user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The communication, hiding attributes,
increasing high security in access, computation, and storage overheads are comparable to centralized
approaches.
In Existing, it is based on ABE (attribute based encryption) technique which is a centralized approach, where a
single Key Distribution Centre (KDC) distributes secret keys and attributes to all users using asymmetric key
approach. We propose a new decentralized access control method for storing data by providing security in
clouds and also we hide the attributes and access rule of a user. The cloud validates the authentication of the
sequence without knowing the users characteristics previous to the data store. By using this approach only
certified users have right to use the suitable attributes. In future, time based file revocation scheme can be used
to assure the deletion of a file. When time limit of a file expires, we implement the policy based renewal of time
to that file.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
Cloud works as an online storage servers and provides long term storage services over the internet. It is like a third party in whom we can store a data so they need data confidentiality, robustness and functionality. Encryption and encoding methods are used to solve such problems. After that divide proxy re-encryption scheme and integrating it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure, robust data storage and retrieval but also lets the user forward his data to another user without retrieving the data. A concept of backup in same server allows users to retrieve failure data successfully in the storage server and also forward to another user without retrieving the data back. This is an attempt to provide light-weight approach which protects data access in distributed storage servers. User can implement all important concept i.e. Confidentiality for security, Robustness for healthy data, Reliability for flexible data, Availability for compulsory data will be achieved to another user which is store in cloud and easily overcome problem of “Securely data forwarding and maintaining, reliability of data in cloud computing “using different type of Methodology and Technology.
This document discusses a proposed system for secure multi-cloud data storage using cryptographic techniques. The key aspects are:
1) The system splits user files into multiple encrypted chunks and stores each chunk in different private or public clouds. This prevents any single entity from accessing the full file.
2) Encryption is performed on the file chunks before storage using a symmetric encryption algorithm (AES is proposed) with an encryption key only known to the user.
3) During access, the encrypted chunks are retrieved, decrypted and merged to reconstruct the original file.
A secure anti collusion data sharing scheme for dynamic groups in the cloudNinad Samel
This document proposes a secure data sharing scheme for dynamic groups in the cloud that achieves:
1) Secure key distribution without secure communication channels by verifying user public keys.
2) Fine-grained access control where legitimate users can access data in the cloud while revoked users cannot.
3) Protection against collusion attacks where revoked users cannot obtain data files even by conspiring with the cloud.
4) Efficient support for dynamic groups where adding/removing users does not require updating other users' keys.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
This document proposes a new system for secure file encryption and sharing in the cloud. It aims to address security issues with sharing data in social media. The key aspects of the proposed system are:
1. It creates separate databases for individual users and a local server to securely store user keys for encryption/decryption.
2. Files are encrypted using triple DES before being stored in the cloud to prevent unauthorized access.
3. A user can share files with others by providing encryption keys through the local server.
4. When a file is shared, a temporary server decrypts and re-encrypts the file with the recipient's key for added security.
The system aims to improve data security when
A self destruction system for dynamic group data sharing in cloudeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Similar to SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
1) The document discusses a proposed design for an intelligent refrigerator that leverages sensor technology and wireless communication to identify food items and order more through an internet connection when supplies are low.
2) Key aspects of the proposal include using RFID to uniquely identify each food item, storing item and usage data in an XML database, monitoring usage patterns to determine reordering needs, and executing orders through an online retailer using stored payment details.
3) Security and privacy concerns with such an internet-connected refrigerator are discussed, such as potential hacking of personal information or unauthorized device control. The proposal aims to minimize human interaction for household management.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
This document summarizes a review paper on performance and emission testing of a 4-stroke diesel engine using ethanol-diesel blends at different pressures. The paper reviews several previous studies that tested blends of 5-30% ethanol mixed with diesel fuel. The studies found that a 10-20% ethanol blend can improve brake thermal efficiency compared to pure diesel, while also reducing emissions like NOx and smoke. Higher ethanol blends required advancing the injection timing to allow the engine to run. Ethanol-diesel blends were found to have lower density, viscosity, pour point and higher flash point compared to pure diesel. Overall, ethanol shows potential as a renewable fuel to improve engine performance and reduce emissions when blended with diesel
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 55
SMONA: Secure Multi-Owner Data sharing for Dynamic Groups in the
Cloud
Pandhare Vishal Arvind1
Hambir Anuja Vilas2
Bhoknal Pradnya Dattatray3
1,2,3
B.E. Student
1,2,3
Computer Department
1,2,3
Jaihind College of Engineering, Kuran
Abstract— The data is stored in the cloud. Storing data
should be risky. Cloud provider should be trustful because
the data is confidentential. The Group manager keeps the
record of group members. The key distribution is done to the
group of each department. The Group members can access
the stored data from cloud. The encryption –decryption
technique is used to store the data. Any cloud user can
anonymously share data with others by providing group
signature and dynamic broadcast encryption techniques.
When new member joined in the group, new granted users
can directly decrypt data files uploaded without contacting
with data owners. Proposing a new model for Sharing
Secure Data in the Cloud for the Multiuser Group.
Key words: SMONA, data sharing, Cloud computing
I. INTRODUCTION
Cloud computing is recognized as an alternative to
traditional information technology due to its intrinsic
resource-sharing and low-maintenance characteristics. One
of the most fundamental services offered by cloud providers
is data storage.
To preserve data privacy, a basic solution is to
encrypt data files, and then upload the encrypted data into
the cloud. Unfortunately, designing an efficient and secure
data sharing scheme for groups in the cloud is not an easy
task due to the following challenging issues:
Identity privacy
Single Owner
Dynamic nature of Groups
In several security schemes such as Plutus, Sirius,
etc proposed for data sharing on untrusted servers, the data
owners store the encrypted data files in untrusted storage
and distribute the corresponding decryption keys only to
authorized users. Thus, unauthorized users as well as storage
servers cannot learn the content of the data files because
they have no knowledge of the decryption keys. However,
the complexities of user participation and revocation in
these schemes are linearly increasing with the number of
data owners and the number of revoked users, respectively.
By setting a group with a single attribute, Lu et al. proposed
a secure provenance scheme based on the cipher text-policy
attribute-based encryption technique, which allows any
member in a group to share data with others. However, the
issue of user revocation is not addressed in their scheme.
The single owner manner hinders the adoption of key policy
attribute-based encryption and other schemes
To overcome the above described challenges we
propose the scheme-SMONA that includes the following:
Secure multi-owner data sharing scheme. It implies
that any user in the group can securely share data
with others by the untrusted cloud.
Support dynamic groups efficiently. Specifically,
new granted users can directly decrypt data files
uploaded before their participation without
contacting with data owners. User revocation can
be easily achieved through a novel revocation list
without updating the secret keys of the remaining
users. The size and computation overhead of
encryption are constant and independent with the
number of revoked users.
Provide secure and privacy-preserving access
control to users, which guarantee any member in a
group to anonymously utilize the cloud resource.
Moreover, the real identities of data owners can be
revealed by the group manager when disputes
occur.
II. LITERATURE SURVEY
In the literature survey we are going to discuss some
existing technique for cloud.
a). E. Goh, H. Shacham, N. Modadugu, and D. Boneh
the use of SiRiUS is compelling in situations where
users have no control over the file server . They
believe that SiRiUS is the most that can be done to
secure an existing network file system without
changing the file server or file system protocol.
Key management and revocation is simple with
minimal out-of-band communication. File system
freshness guarantees are supported by SiRiUS
using hash tree constructions. SiRiUS contains a
novel method of performing file random access in a
cryptographic file system without the use of a
block server. Extensions to SiRiUS include
largescale group sharing using the NNL key
revocation construction.
b). Wang, B. Li, and H. Li, in this paper, we propose
Knox, a privacy-preserving auditing scheme for
shared data with large groups in the cloud. They
utilize group signatures to compute verification
information on shared data, so that the TPA is able
to audit the correctness of shared data, but cannot
reveal the identity of the signer on each block.
With the group manager’s private key, the original
user can efficiently add new users to the group and
disclose the identities of signers on all blocks. The
efficiency of Knox is not affected by the number of
users in the group.
c). M. Armbrust, A. Fox, R. Griffith, A.D. Joseph,
R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson,
A. Rabkin, I. Stoica, and M. Zaharia the data
centers hardware and software is what we will call
a cloud. When a cloud is made available in a pay-
as-you-go manner to the general public, they call it
a public cloud; the service being sold is utility
computing. They use the term private cloud to refer
to internal data centers of a business or other
organization, not made available to the general
2. SMONA: Secure Multi-Owner Data sharing for Dynamic Groups in the Cloud
(IJSRD/Vol. 2/Issue 09/2014/012)
All rights reserved by www.ijsrd.com 56
public, when they are large enough to benefit from
the advantages of cloud computing that we discuss
here. Thus, cloud computing is the sum of SaaS
and utility computing, but does not include small or
medium-sized data centers, even if these rely on
virtualization for management. People can be users
or providers of SaaS, or users or providers of utility
computing. They focus on SaaS providers cloud
providers, which have received less attention than
SaaS users.
d). S. Kamara and K. Lauter in this paper consider the
problem of building a secure cloud storage service
on top of a public cloud infrastructure where the
service provider is not completely trusted by the
customer. They describe, at a high level, several the
benefits such architecture would provide to both
customers and service providers and give an
overview of recent advances in cryptography
motivated specifically by cloud storage.
e). Fiat and M. Naor they introduce new theoretical
measures for the qualitative and quantitative
assessment of encryption schemes designed for
broadcast transmissions. The goal is to allow a
central broadcast site to broadcast secure
transmissions to an arbitrary set of recipients while
minimizing key management related transmissions.
They present several schemes that allow centers to
broadcast a secret to any subset of privileged users
out of a universe of size so that coalitions of users
not in the privileged set cannot learn the secret.
f). V. Goyal, O. Pandey, A. Sahai, and B. Waters they
develop a new cryptosystem for One-grained
sharing of encrypted data that call Key-Policy
Attribute-Based Encryption (KP-ABE). In
cryptosystem, cipher texts are labelled with sets of
attributes and private keys are associated with
access structures that control which cipher texts a
user is able to decrypt. They demonstrate the
applicability of our construction to sharing of audit-
log information and broadcast encryption. Our
construction supports delegation of private keys
which subsumes Hierarchical Identity-Based
Encryption (HIBE). The data owner uses a random
key to encrypt a file, where the random key is
further encrypted with a set of attributes using KP-
ABE.
g). Ateniese et al. leveraged proxy reencryptions to
secure distributed storage. Specifically, the data
owner encrypts blocks of content with unique and
symmetric content keys, which are further
encrypted under a master public key. For access
control, the server uses proxy cryptography to
directly re-encrypt the appropriate content key(s)
from the master public key to a granted user’s
public key. Unfortunately, a collusion attack
between the untrusted server and any revoked
malicious user can be launched, which enables
them to learn the decryption keys of all the
encrypted blocks.
III. EXISTING SYSTEM
In the literature study we have seen many methods for
secure data sharing in cloud computing, however most
methods failed to achieve the efficient as well as secure
method for data sharing for groups. To provide the best
solutions for the problems imposed by existing methods,
recently the new method was presented called MONA. This
approach presents the design of secure data sharing scheme,
Mona, for dynamic groups in an untrusted cloud. In Mona, a
user is able to share data with others in the group without
revealing identity privacy to the cloud. Additionally, Mona
supports efficient user revocation and new user joining.
More specially, efficient user revocation can be achieved
through a public revocation list without updating the private
keys of the remaining users, and new users can directly
decrypt files stored in the cloud before their participation.
Moreover, the storage overhead and the encryption
computation cost are constant.
Therefore practically in all cases MONA
outperforms the existing methods.
A. Disadvantages of Existing System
However as per reliability and scalability concern this
method needs to be workout further as if the group manager
stop working due to large number of requests coming from
different groups of owners, then entire security system of
MONA failed down.
IV. PROPOSED SOLUTION
To achieve the reliable and scalable in SMONA, in this
paper we are presenting the new framework for SMONA. In
this method we are further presenting how we are managing
the risks like failure of group manager by increasing the
number of backup group manager, hanging of group
manager in case number of requests more by sharing the
workload in multiple group managers. This method claims
required efficiency, scalability and most importantly
reliability.
3. SMONA: Secure Multi-Owner Data sharing for Dynamic Groups in the Cloud
(IJSRD/Vol. 2/Issue 09/2014/012)
All rights reserved by www.ijsrd.com 57
A. Advantage of proposed system
To overcome the disadvantage of existing system MONA, in
the proposed MONA is if the group manager stop working
due to large number of requests coming from different
groups of owners, then backup group manager will remains
available.
V. SYSTEM MODEL AND DESIGN GOALS
A. System Model
We consider a cloud computing architecture by combining
with an example that a company uses a cloud to enable its
staffs in the same group or department to share files. The
system model consists of three different entities: the cloud, a
group manager (i.e., the company manager), and a large
number of group members (i.e., the staffs) as illustrated in
Fig. 1. Cloud is operated by CSPs and provides priced
abundant storage services. However, the cloud is not fully
trusted by users since the CSPs are very likely to be outside
of the cloud users’ trusted domain. Similar to, we assume
that the cloud server is honest but curious. That is, the cloud
server will not maliciously delete or modify user data due to
the protection of data auditing schemes , but will try to learn
the content of the stored data and the identities of cloud
users. Group manager takes charge of system parameters
generation, user registration, user revocation, and revealing
the real identity of a dispute data owner. In the given
example, the group manager is acted by the administrator of
the company. Therefore, we assume that the group manager
is fully trusted by the other parties. Group members are a set
of registered users that will store their private data into the
cloud server and share them with others in the group. In our
example, the staffs play the role of group members. Note
that, the group membership is dynamically changed, due to
the staff resignation and new employee participation in the
company.
B. Design Goals
In this section, we describe the main design goals of the
proposed scheme including access control, data
confidentiality, anonymity and traceability, and efficiency as
follows:
1) Access Control:
The requirement of access control is twofold. First, group
members are able to use the cloud resource for data
operations. Second, unauthorized users cannot access the
cloud resource at any time, and revoked users will be
incapable of using the cloud again once they are revoked.
2) Data Confidentiality:
Data confidentiality requires that unauthorized users
including the cloud are incapable of learning the content of
the stored data. An important and challenging issue for data
confidentiality is to maintain its availability for dynamic
groups. Specifically, new users should decrypt the data
stored in the cloud before their participation, and revoked
users are unable to decrypt the data moved into the cloud
after the revocation.
3) Anonymity and traceability:
Anonymity guarantees that group members can access the
cloud without revealing the real identity. Although
anonymity represents an effective protection for user
identity, it also poses a potential inside attack risk to the
system. For example, an inside attacker may store and share
a mendacious information to derive substantial benefit.
Thus, to tackle the inside attack, the group manager should
have the ability to reveal the real identities of data owners.
4) Efficiency:
The efficiency is defined as follows: Any group member can
store and share data files with others in the group by the
cloud. User revocation can be achieved without involving
the remaining users. That is, the remaining users do not need
to update their private keys or re-encryption operations.
New granted users can learn all the content data files stored
before his participation without contacting with the data
owner.
VI. SCHEME DESCRIPTION
A. Cloud Computing
In cloud computing, the word cloud is used as a metaphor
for “the Internet” so the phrase cloud computing means "a
type of Internet-based computing," where different services
such as servers, storage and applications -- are delivered to
an organization's computers and devices through the
Internet.
B. System Initialization
The group manager takes charge of system initialization as
follows: Generating a bilinear map group system.
C. Cloud Module
In this module, we provide priced abundant storage services.
The users can upload their data in the cloud. We develop
this module, where the cloud storage can be made secure.
However, the cloud is not fully trusted by users since the
CSPs are very likely to be outside of the cloud users’ trusted
domain. Similar to we assume that the cloud server is honest
but curious. That is, the cloud server will not maliciously
delete or modify user data due to the protection of data
auditing schemes, but will try to learn the content of the
stored data and the identities of cloud users
D. Group Manager Module
Group manager takes charge of followings,
System parameters generation,
User registration,
User revocation, and
Revealing the real identity of a dispute data owner.
Therefore, we assume that the group manager is
fully trusted by the other parties. The Group manager is the
admin. The group manager has the logs of each and every
process in the cloud. The group manager is responsible for
user registration and also user revocation too.
E. Group Member Module
Group members are a set of registered users that will
Store their private data into the cloud server and
Share them with others in the group.
Note that, the group membership is dynamically
changed, due to the staff resignation and new employee
participation in the company. The group member has the
ownership of changing the files in the group. Whoever in the
group can view the files which are uploaded in their group
and also modify it. The group member.
4. SMONA: Secure Multi-Owner Data sharing for Dynamic Groups in the Cloud
(IJSRD/Vol. 2/Issue 09/2014/012)
All rights reserved by www.ijsrd.com 58
F. File Security module
Encrypting the data file.
File stored in the cloud can be deleted by either the
group manager or the data owner. (i.e., the member
who uploaded the file into the server).
G. Group Signature Module
A group signature scheme allows any member of the group
to sign messages while keeping the identity secret from
verifiers. Besides, the designated group manager can reveal
the identity of the signature’s originator when a dispute
occurs, which is denoted as traceability.
H. User Revocation Module
User revocation is performed by the group manager via a
public available revocation list (RL), based on which group
members can encrypt their data files and ensure the
confidentiality against the revoked users.
VII. CONCLUSION
In conclusion, cloud computing is very attractive
environment for business world in term of providing
required services in a very cost effective way. However,
assuring and enhancing security and privacy practices will
attract more enterprises to world of the cloud computing In
Thus to achieve the reliable and scalable in MONA, in this
paper we are presenting the new framework for MONA. In
this method we are further presenting how we are managing
the risks like failure of group manager by increasing the
number of backup group manager, hanging of group
manager in case number of requests more by sharing the
workload in multiple group managers. This method claims
required efficiency, scalability and most importantly
reliability. Extensive analyses show that our proposed
scheme satisfies the desired security requirements and
guarantees efficiency as well.
VIII. FUTURE ENHANCEMENT
Our project has been developed in a very short period of
time and all the efforts have been taken so that this project is
very efficient in its execution. Although, there still exists
scope for the improvement of our project in the future. Our
project has been developed mainly by taking the example of
the environment of the company. We can extend our project
to the fields such as education, entertainment, various social
networks and other wider areas. For example, we can
employ our project in the universities to maintain the data
base of the students which can be used by the groups of
lecturers. Here lecturer becomes the group member and the
head of the department becomes the group manager.
Further enhancement in the security of the data uploaded by
the members can be done. We can also concentrate on
creating sub groups in the groups. We can concentrate on
preserving identity privacy for its enhancement. Interaction
between the group manager and the group member should
be improved.
REFERENCES
[1] Xuefeng Liu, Yuqing Zhang, Boyang Wang, and
Jingbo Yan, “Mona: Secure Multi-Owner Data
Sharing for Dynamic Groups in the Cloud”, IEEE
TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 24, NO. 6,
JUNE 2013.
[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph,
R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson,
A. Rabkin, I. Stoica, and M. Zaharia, “A View of
Cloud Computing,” Comm. ACM, vol. 53, no. 4,
pp. 50-58, Apr. 2010.
[3] S. Kamara and K. Lauter, “Cryptographic Cloud
Storage,” Proc. Int’l Conf. Financial Cryptography
and Data Security (FC), pp. 136- 149, Jan. 2010.
[4] E. Goh, H. Shacham, N. Modadugu, and D. Boneh,
“Sirius: Securing Remote Untrusted Storage,” Proc.
Network and Distributed Systems Security Symp.
(NDSS), pp. 131- 145, 2003.
[5] B. Wang, B. Li, and H. Li, “Knox: Privacy-
Preserving Auditing for Shared Data with Large
Groups in the Cloud,” Proc. 10th Int’l Conf.
Applied Cryptography and Network Security, pp.
507-525, 2012.
[6] A. Fiat and M. Naor, “Broadcast Encryption,”
Proc. Int’l Cryptology Conf. Advances in
Cryptology (CRYPTO), pp. 480-491, 1993.
[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute- Based Encryption for Fine-Grained
Access Control of Encrypted Data,” Proc. ACM
Conf. Computer and Comm. Security (CCS), pp.
89-98, 2006.
[8] D. Pointcheval and J. Stern, “Security Arguments
for Digital Signatures and Blind Signatures,” J.
Cryptology, vol. 13, no. 3, pp. 361-396, 2000.
[9] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure
Provenance: The Essential of Bread and Butter of
Data Forensics in Cloud Computing,” Proc. ACM
Symp. Information, Computer and Comm.
Security, pp. 282-292, 2010.