Enhancing the Security for Multi-Owner Data Sharing (MODS) Groups in the Cloud with Improved Dynamism

Authors

  • Dr. D. Ravindran  School of Computer Science, St. Joseph’s College, Trichirapalli-2, Tamil Nadu, India
  • S. Sahaya Nirmala Daisy  School of Computer Science, St. Joseph’s College, Trichirapalli-2, Tamil Nadu, India

Keywords:

Cloud Computing, Data Sharing, Privacy-Preserving, Access Control, Dynamic Groups, Web Service, Random Keygeneration.

Abstract

Cloud Computing is a developing technology that uses the internet and central remote servers to maintain data and applications. Cloud computing permitscustomers and businesses to use requests without connection and access their private files at any system with internet access. This technology permits for much well-organized computing by unifying data storage, processing and band width. The important service provided by the Cloud computing is Data Storage that is progressively more customers. But the regular changes of the membership sharing data in multi-owner manner become a very challenging task. Therefore, in this paper propose the group signature and dynamic broadcast encryption techniques, any cloud user can in secret share data on to others. Meanwhile, the storage above and encryption calculation cost of our scheme are free with the number of revoked users. In addition, a random password is generated by the web service and sent to the mail id of the user to view, edit and delete the file from the system.

References

  1. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, "Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.24, NO. 6, JUNE 2013
  2. Kallahalla, E. Riedel, R. Swami Nathan, Q. Wang, and K. Fu,"Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc.USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
  3. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003
  4. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005
  5. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
  6. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing," Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010

Downloads

Published

2016-08-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. D. Ravindran, S. Sahaya Nirmala Daisy, " Enhancing the Security for Multi-Owner Data Sharing (MODS) Groups in the Cloud with Improved Dynamism, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 4, pp.681-686, July-August-2016.