Untraceable Group Data Sharing for Secure Cloud

Authors

  • T Santosh  Associate Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • P Cefhora  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • T Chandana  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Clouding Computing, Data Sharing, Privacy Preserving, Access Control, Dynamic Groups.

Abstract

Cloud computing is nothing but delivering applications as services over internet and these services are provided by combination of hardware’s and software’s of data center’s and these services as Saas, Paas,Iaas etc. cloud computing commonly describe as converting capital expenses into operating expenses (CapEx to OpEx. Cloud computing provide ability to store data in cloud and share that valuable data to multiple authorized users. It also provides economical and efficient solution for sharing group resources among multiple cloud users. Sharing data among multiple users’ lights on defensive of data and identity privacy of users from untrusted cloud is still challenging problem. Encrypting documents with different keys using public key cryptosystem such as Attribute based encryption (ABE) and Proxy re-encryption has some weaknesses. It can’t efficiently handles adding or revoking users or identity attributes. In this paper we proposed a secure, efficient data sharing scheme for dynamic groups in cloud with anonymous authentication of cloud users. By combining group signatures and dynamic broad encryption technique, any cloud user will anonymously share data with other users efficiently. There are some issues regarding storage overhead and encryption computation costs are overcome here.

References

  1. Dr .K. Kartheeban , A.Durai Murugan "Privacy Preserving Data Storage Technique in Cloud Computing" 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING 978-1-5090-4778-9/17/$31.00 ©2017 IEEE
  2. Haifeng Lu, Chuan Heng Foh, Yong gang Wen, and Jianfei Cai, “Delay-Optimized File Retrieval under LTBased Cloud Storage”, IEEE transactions on cloud computing, vol. 5, no. 4, october-december 2017
  3. Yong Cui , Zeqi Lai, Xin Wang, and Ningwei Dai,” QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services”, IEEE transactions on mobile computing, vol. 16, no. 12, december 2017
  4. Hui Tian, Yuxiang Chen, Chin-Chen Chang,Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu,” Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE transactions on services computing, vol. 10, no. 5, september/october 2017
  5. Jiguo Li, Xiaonan Lin, Yichen Zhang, and Jinguang Han,” KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage”, IEEE transactions on services computing, vol. 10, no. 5, september/october 2017
  6. Guoxin Liu and Haiying Shen, “Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers”, IEEE/ACM transactions on networking, vol. 25, no. 4, august 2017
  7. Guoxin Liu, Haiying Shen, and Haoyu Wang, ” An Economical and SLO-Guaranteed Cloud Storage Service Across Multiple Cloud Service Providers”, IEEE transactions on parallel and distributed systems, vol. 28, no. 9, september 2017
  8. Jianwei Yin, Yan Tang, Shuiguang Deng, Ying Li, Wei Lo, Kexiong Dong, Albert Y. Zomaya, and Calton Pu,” ASSER: An Efficient, Reliable, and Cost-Effective Storage Scheme for Object-Based Cloud Storage Systems”, IEEE transactions on computers, vol. 66, no. 8, august 2017.
  9. Mazhar Ali, , Saif U. R. Malik, and Samee U. Khan, " Data Security for Cloud Environment with SemiTrusted Third Party”IEEE transactions on cloud computing, vol. 5, no. 4, october-december 2017
  10. Anmin Fu, Shui Yu, Yuqing Zhang, Huaqun Wang, and Chanying Huang,” NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users” , © 2017 IEEE Transactions on Big Data.
  11. Nicolae Paladi, Christian Gehrmann, and Antonis Michalas,” Providing User Security Guarantees in Public Infrastructure Clouds” IEEE transactions on cloud computing, vol. 5, no. 3, july-september 2017
  12. Zhitao Guan, Jing Li, Longfei Wu, Yue Zhang, Jun Wu, and Xiaojiang Du,” Achieving Efficient and Secure Data Acquisition forCloud-Supported Internet of Things in Smart Grid” IEEE internet of things journal,vol. 4, no. 6, december 2017
  13. Dr Shekha Chenthara,Khandakar Ahmed,Frank Whittaker 2019 "Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing" DOI 10.1109/ACCESS.2019.2919982, © 2019 IEEE Access
  14. Arfatul Mowla Shuvo,d Md. Salauddin Amin,d Promila Haqu "Storage Efficient Data Security Model for Distributed Cloud Storage"2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC) | 978-1-7281-1110-0/20/$31.00 ©2020 IEEE | DOI: 10.1109/R10-HTC49770.2020.935696
  15. Kavya K ,Smt. Kavitha M 2020 "Military Message Passing using Consortium Blockchain Technology" Proceedings of the Fifth International Conference on Communication and Electronics Systems (ICCES 2020)IEEE Conference Record # 48766; IEEE Xplore ISBN: 978-1-7281-5371-1

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
T Santosh, P Cefhora, T Chandana "Untraceable Group Data Sharing for Secure Cloud" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 5, pp.311-316, September-October-2022.