Secure File Sharing between Multiple Clouds using Encrypted Mechanism

Authors

  • N. Meena  Student, Department of Computer Science, Sri Venkateswara College of Engineering For Women, Karakambadi Road, Tirupati, Andhra Pradesh, India
  • Pydimani Lakshmi  Assistant Professor, Department of Computer Science And Engineering,Sri Venkateswara College of Engineering For Women, Karakambadi Road, Tirupati, Andhra Pradesh, India

Keywords:

Security, Data sharing, Cloud computing, key policies, SHA (Secure Hash Algorithm1)

Abstract

A large amount of the data is stored in the file one can retrieve or access the stored data easily. Now-a-days most of the people are concentrate on the file sharing for sharing the important data. But many techniques are concentrating on owner to single user filesharing. In this paper, we propose File share for the secure data sharing between the multiple organizations in the different clouds for the multiple users. The proposed protocol is based on the revocable key- policy Attribute- Based Encryption schemes and it allows a lot of users to share the data in the cloud based on the policy which is defined by the data owner . Furthermore, access to a malicious or compromised user/organization can be easily revoked without the need to generate fresh encryption keys. The file is shared to the multiple users of the particular category by the owner. By this a lot of time is saved as the data corresponding to the particular category are shared to all the users registered with that particular category.

References

  1. R Dowsley, A. Michalas, and M. Nagel, "A report on design and implementation of protected searchable data in iaas," tech. rep., Swedis Institute of Computer Science (SICS), 2016.
  2. Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hbsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," in Proceedings of the 5th International Conference on Cloud Computing and Services Science, pp. 206 213, 2015.
  3. A Michalas and K. Y. Yigzaw, "Locless: Do you really care your cloud files are?," in 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC), pp. 618-623, Dec 2015.
  4. A Michalas, "Sharing in the rain: Secure and efficient data sharing for the cloud," in 2016 International Conference for Internet Technology And Secured Transactions, pp. 589-595, Dec 2016.
  5. N Paladi, A. Michalas, and C. Gehrmann, "Domain based storage protection with secure access control for the cloud," in Proceedings of the 2014 International Workshop on Security in Cloud Computing, ASIACCS 14, (New York, NY, USA), ACM, 2014.
  6. Y Verginadis, A. Michalas, P. Gouvas, G. Schiefer, G. Hubsch, and I. Paraskakis, "Paasword: A holistic data privacy and security by design framework for cloud services," pp. 1-16, 2017.
  7. A Sahai and H. Seyalioglu, "Dynamic credentials and ciphertext delegation for attribute-based encryption," in in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO2012, pp. 199-217, Springer, 2012.
  8. D Dolev and A. C. Yao, "On the security of public key protocols," Information Theory, IEEE Transactions on, vol. 29, no. 2, 1983.
  9. A Michalas, N. Komninos, N. R. Prasad, and V. A. Oleshchuk, "New client puzzle approach for dos resistance in ad hoc networks," in Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, pp. 568-573, IEEE, 2010.
  10. A. Michalas, N. Komninos, and N. R. Prasad, "Mitigate dos and ddos attack in mobile ad hoc networks," International Journal of DigitaCrime and Forensics (IJDCF), vol. 3, no. 1, pp. 14-36, 2011.
  11. A. Michalas, N. Komninos, and N. Prasad, "Multiplayer game for ddos attacks resilience in ad hoc networks," in Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, pp. 1-5, Feb 2011.
  12. A. Michalas, N. Komninos, and N. R. Prasad, "Cryptographic puzzles and game theory against dos and ddos attacks in networks," International Journal of Computer Research, vol. 19, no. 1, p. 79, 2012.
  13. T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments," in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-5, May 2012.
  14. T. Dimitriou and A. Michalas, "Multi-party trust computation in decentralized environments in the presence of malicious adversaries," Ad Hoc Networks, vol. 15, pp. 53-66, Apr. 2014

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
N. Meena, Pydimani Lakshmi, " Secure File Sharing between Multiple Clouds using Encrypted Mechanism, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.716-720, May-June-2018.