Enhancing Invulnerability for Multi User Data Sharing using Key Agreement Protocol in Cloud Computing

Authors

  • Vivek Jaysing Nagargoje  Department of Computer Engineering, Siddhant College of Engineering, Sudumbare Maharashtra India
  • Manisha Darak  Department of Computer Engineering, Siddhant College of Engineering, Sudumbare Maharashtra India

Keywords:

Key Agreement Protocol, Centro Symmetric Balanced Incomplete Block Style (SBIBD), Data Sharing, Cloud Computing

Abstract

Data sharing in cloud computing permits multiple participants to freely share the cluster knowledge that improves the efficiency of labor in cooperative environments and has widespread potential applications. However, a way to build positive the protection knowledge info} of information sharing among and therefore the because of efficiently share the out sourced information in Associate in Nursing terribly cluster manner unit of activity formidable challenges. Note that key agreement protocols have contend a awfully necessary role in secure and economical cluster knowledge sharing in cloud computing. throughout this paper, by taking advantage of the Centro parallel balanced incomplete block vogue (SBIBD), we've a bent to tend to gift a unique block design-based key agreement protocol that supports multiple participants, which can exile extend the number of participants in Associate in Nursing terribly cloud surroundings the structure of the block vogue. Supported the planned cluster knowledge sharing model, we've a bent to gift general formulas for generating the common conference key K for multiple participants. Note that by taking advantage of the block vogue, the tactic complexness of the planned protocol linearly can increase with the number of participants and also the communication quality is greatly reduced. To boot, the fault tolerance property of our protocol permits the cluster knowledge sharing in cloud computing to face to utterly completely different key attacks, that's analogous to protocol.

References

  1. L. Zhou, V. Varadharajan, and M. Hitchens, “Cryptographic rolebased access control for secure Cloud data storage systems,” Information Forensics and ecurity IEEE Transactions on, vol. 10, no. 11, pp. 2381–2395, 2015
  2. F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in IEEE INFOCOM, 2014, pp. 673–681.
  3. D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, pp. 1–10, 2015.
  4. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
  5. J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, “An efficient rfid authentication protocol providing strong privacy and security,” Journal of Internet Technology, vol. 17, no. 3, p. 2, 2016
  6. L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, “An efficient protocol for authenticated key agreement,” Designs Codes and Cryptography, vol. 28, no. 2, pp. 119–134, 2010.
  7. X. Yi, “Identity-based fault-tolerant conference key agreement,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 3, pp. 170–178, 2004.
  8. R. Barua, R. Dutta, and P. Sarkar, “Extending joux’s protocol to multi party key agreement (extended abstract).” Lecture Notes in Computer Science, vol. 2003, pp. 205–217, 2003.
  9. J. Shen, S. Moh, and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design,” Journal of Communications and Networks, vol. 14, no. 6, pp. 682–691,2012.
  10. B. Dan and M. Franklin, “Identity-based encryption from the weil pairing,” Siam Journal on Computing, vol. 32, no. 3, pp. 213–229,2003.
  11. S. Blakewilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” in IMA International Conference on Cryptography and Coding, 1997, pp. 30–45.
  12. I. Chung and Y. Bae, “The design of an efficient load balancing algorithm employing block design,” Journal of Applied Mathematics and Computing, vol. 14, no. 1, pp. 343–351, 2004.
  13. O. Lee, S. Yoo, B. Park, and I. Chung, “The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design.” Information Sciences, vol. 176, no. 15, pp. 2148–2160, 2006.
  14. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 79–88, 2011.
  15. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp.222–233, 2014.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Vivek Jaysing Nagargoje, Manisha Darak, " Enhancing Invulnerability for Multi User Data Sharing using Key Agreement Protocol in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.649-656, May-June-2019.