Secure File Sharing between Multiple Clouds using Encrypted Mechanism

Authors(2) :-N. Meena, Pydimani Lakshmi

A large amount of the data is stored in the file one can retrieve or access the stored data easily. Now-a-days most of the people are concentrate on the file sharing for sharing the important data. But many techniques are concentrating on owner to single user filesharing. In this paper, we propose File share for the secure data sharing between the multiple organizations in the different clouds for the multiple users. The proposed protocol is based on the revocable key- policy Attribute- Based Encryption schemes and it allows a lot of users to share the data in the cloud based on the policy which is defined by the data owner . Furthermore, access to a malicious or compromised user/organization can be easily revoked without the need to generate fresh encryption keys. The file is shared to the multiple users of the particular category by the owner. By this a lot of time is saved as the data corresponding to the particular category are shared to all the users registered with that particular category.

Authors and Affiliations

N. Meena
Student, Department of Computer Science, Sri Venkateswara College of Engineering For Women, Karakambadi Road, Tirupati, Andhra Pradesh, India
Pydimani Lakshmi
Assistant Professor, Department of Computer Science And Engineering,Sri Venkateswara College of Engineering For Women, Karakambadi Road, Tirupati, Andhra Pradesh, India

Security, Data sharing, Cloud computing, key policies, SHA (Secure Hash Algorithm1)

  1. R Dowsley, A. Michalas, and M. Nagel, "A report on design and implementation of protected searchable data in iaas," tech. rep., Swedis Institute of Computer Science (SICS), 2016.
  2. Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hbsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," in Proceedings of the 5th International Conference on Cloud Computing and Services Science, pp. 206 213, 2015.
  3. A Michalas and K. Y. Yigzaw, "Locless: Do you really care your cloud files are?," in 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC), pp. 618-623, Dec 2015.
  4. A Michalas, "Sharing in the rain: Secure and efficient data sharing for the cloud," in 2016 International Conference for Internet Technology And Secured Transactions, pp. 589-595, Dec 2016.
  5. N Paladi, A. Michalas, and C. Gehrmann, "Domain based storage protection with secure access control for the cloud," in Proceedings of the 2014 International Workshop on Security in Cloud Computing, ASIACCS 14, (New York, NY, USA), ACM, 2014.
  6. Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hubsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," pp. 1-16, 2017.
  7. A Sahai and H. Seyalioglu, "Dynamic credentials and ciphertext delegation for attribute-based encryption," in in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO2012, pp. 199-217, Springer, 2012.
  8. D Dolev and A. C. Yao, "On the security of public key protocols," Information Theory, IEEE Transactions on, vol. 29, no. 2, 1983.
  9. A Michalas, N. Komninos, N. R. Prasad, and V. A. Oleshchuk, "New client puzzle approach for dos resistance in ad hoc networks," in Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, pp. 568-573, IEEE, 2010.
  10. A. Michalas, N. Komninos, and N. R. Prasad, "Mitigate dos and ddos attack in mobile ad hoc networks," International Journal of DigitaCrime and Forensics (IJDCF), vol. 3, no. 1, pp. 14-36, 2011.
  11. A. Michalas, N. Komninos, and N. Prasad, "Multiplayer game for ddos attacks resilience in ad hoc networks," in Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, pp. 1-5, Feb 2011.
  12. A. Michalas, N. Komninos, and N. R. Prasad, "Cryptographic puzzles and game theory against dos and ddos attacks in networks," International Journal of Computer Research, vol. 19, no. 1, p. 79, 2012.
  13. T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments," in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5, May 2012.
  14. T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments in the presence of malicious adversaries," Ad Hoc Networks, vol. 15, pp. 53-66, Apr. 2014

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 716-720
Manuscript Number : CSEIT1835147
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

N. Meena, Pydimani Lakshmi, "Secure File Sharing between Multiple Clouds using Encrypted Mechanism", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.716-720, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT1835147

Follow Us

Contact Us