A Novel Approach for Data Sharing Securely in Cloud Computing

Authors(2) :-Ch. Radhika Devi, K. Jaya Krishna

Cloud storage is aservice of clouds that causes, associations to change from building up in-house information stockpiling frameworks to the cloud. The advances that proposed as of late have offered ascend to the ubiquity and accomplishment of cloud computing. Be that as it may, while outsourcing the information and business application to athird party causes the security and protection issues to wind up noticeably a basic concern. Inside an association, information should be shared among various clients with various certifications. Secure sharing of information among a gathering which causes an insider danger from substantial or noxious client is an essential research issue. Current approach gives an answer on previously mentioned issue. Under this approach, the third party is a responsible for security related tasks like encryption, decryption, and key age, get to control, and so on. In any case, there might be a probability that this third party may indicate noxious conduct and causes insider risk. A superior approach ought to give an answer which limits confide in third party while guaranteeing information classification. We propose an approach, in light of two layers of encryption that tends to such necessity. Under our approach, the information owner plays out a lower layer encryption, though the third party plays out an upper layer encryption over the owner scrambled information. A testing issue is the means by which to keep up secrecy of information. To actualize it we moved access control right dissemination task to the owner. The owner sends a key to legitimate clients for encryption and decryption. This guarantees just substantial client will get an entrance to the information.

Authors and Affiliations

Ch. Radhika Devi
Department of MCA, QIS college of Engineering and technology, Ongole, Andhra Pradesh, India
K. Jaya Krishna
Associate professor, Department of MCA, QIS college of Engineering and technology, Ongole, Andhra Pradesh, India

Cloud Computing, Confidentiality, Access control, Secure Sharing, Privacy, Security.

  1. A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, "Towards secure mobile cloud computing: A survey," Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278–1299, Jul. 2013.
  2. L. Wei, H. Zhu, Z. Cao, Y. Chen, and A. V. Vasilakos, "Security and pri- vacy for storage and computation in cloud computing," Inf. Sci., vol. 258, pp. 371–386, Feb. 2014.
  3. Cloud security Alliance, "Security guidelines for critical areas of focus in cloud computing v3.0," 2011.
  4. D. Chen et al., "Fast and scalable multi-way analysis of massive neural data," IEEE Trans. Comput., DOI: 10.1109/TC.2013.2295806, 2014, to be published.
  5. A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, "Incremental proxy re-encryption scheme for mobile cloud computing environment," J. Supercomput., vol. 68, no. 2, pp. 624–651, May 2014.
  6. Y. Chen and W. Tzeng, "Efficient and provably-secure group key man- agement scheme using key derivation," in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295–302. 
  7. Cloud Security Alliance, "Security guidelines for critical areas of focus in cloud computing v3. 0," 2011.
  8. Zhifeng Xiao and Yang Xiao, Senior Member,IEEE, "Security and Privacy in Cloud Computing", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013. 
  9. Mazhar Ali, Student Member, IEEE, Revathi Dhamotharan Eraj Khan, Samee U. Khan, Senior Member, IEEE, Athanasios V. Vasilakos, Senior Member, IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow, IEEE,"SeDaSC: Secure Data Sharing in Clouds"IEEE SYSTEMS JOURNAL 2015. 
  10. S. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient  Certificateless Encryption for Secure Data Sharing in  Public Clouds," IEEE Trans. Knowl. Data Eng., Vol. 26,  no. 9, pp. 2107–2119, Sep. 2013. 
  11. Mohamed Nabeel and Elisa Bertino, Fellow, IEEE,Privacy Preserving Delegated Access Control in Public Clouds", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 9, SEPTEMBER 2014.
  12. L. Xu, X. Wu, and X. Zhang, "CL-PRE: A certificateless proxy re- encryption scheme for secure data sharing with public cloud," in Proc. 7th ACM Symp. Inf. , Comput. Commun. Security, 2012, pp. 87–88.
  13. P. Gutmann, "Secure deletion of data from magnetic and solid-state memory," in Proc. 6th USENIX Security Symp. Focusing Appl. Cryptog- raphy, 1996, p. 8.
  14. S. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificate- less Encryption for Secure Data Sharing in Public Clouds," IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107–2119, Sep. 2013.
  15. Y. Chen, J. D. Tygar, and W. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in Proc. IEEE INFOCOM, pp. 1952–1960.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1155-1162
Manuscript Number : CSEIT1833551
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Ch. Radhika Devi, K. Jaya Krishna, "A Novel Approach for Data Sharing Securely in Cloud Computing ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1155-1162, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview