Block Design Key for Secure Data Sharing in Cloud Computing

Authors

  • Rashmi K  Master of Computer Application, PES College of Engineering, Mandya, Karnataka, India
  • H. P. Mohan Kumar  Master of Computer Application, PES College of Engineering, Mandya, Karnataka, India

DOI:

https://doi.org//10.32628/CSEIT1953107

Keywords:

Data sharing, Key agreement protocol, cloud computing, TPA, Security, AES.

Abstract

Sharing Data in cloud allows multiple participants to share the group of data we are gifting a distinctive block design-based key agreement protocol that supports multiple participants, in whatever the way to make the protection of the data more secure while sharing between two users. Secure data sharing is performed using a private key generated and transmitted using secure channels. A key agreement protocol is used for data transfer to make more protection compare to later communication and this protocol is applied in cloud computing to support secure and economical sharing. In addition, an AES algorithm is used to encrypt the data. We have a susceptibility to estimate Block design key for secure data sharing in cloud, based on key agreement protocol with in which TPA verifies the malicious user from the group. To protect the data more secure every time when user as to download the data the TPA generates key to user. Every time the key is generated as, an OTP to secure the data from the attacker the user must use the same key to decrypt the data. In addition to that, the owner file is also generated to user. TPA acknowledge malignant client from group and detract from group we have a tendency to blessing general recipes for creating the normal meeting key for numerous members.

References

  1. X.Yi, “identity –based fault tolerant conference key agreement”, IEEE transactions on dependable and secure computing,vol.1,no.3,pp 170-178,2004.
  2. J.Yu, K.Ren, and C.Wang,”Enabling cloud storage auditing with verifiable outsourcing of key updates” IEEE transactions on information forensics and security,vol.11,no.6,pp.1-1,2016.
  3. J.Yu,K. Ren, C.Wang and V.Varadharajan,”Enabling cloud storage auditing with Key-exposure resistance,” IEE Transactions on information forensics and security,vol.10,no.6,pp.1-1,2015.
  4. L.Zhou,V.Varadharajan and M.Hitchens, ”Cryptographic rolebased access control for secure cloud data storage systems” information forensics and security IEEE transactions on,vol.10,no.11,pp.2381-2395,2015
  5. H.Guo, Z.Li, Y.Mu, and X.Zhang,”Cryptanalysis of simple three-party key exchange protocol” computers and security,vol.27,no.1-2,pp.16-21,2008.
  6. W.Diffie and M.E.Hellman, “New directions in cryptography,” IEEE Transactions on information theory,vol.22,no.6,pp.644-654,1976.
  7. L.Xu,X.Wu, and X.Zhang,”CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud,” in proc 7th ACM symp. Inf,comput.commun security,2012,pp.87-88.
  8. S.Seo,M.Nabeel,X.Ding and E.Bertino,”An Efficient Cerficate-less encryption for secure data sharing in public clouds”,IEEE Transactions Data Eng,vol.26,no.9,no.9,pp.2107-2119,sep.2013.
  9. Y.Chen and W.Tzeng,”Efficient and provably-secure group key management scheme using key derivation,” in proc. IEEE 11th intconf trustcom,2012,pp.295-302.
  10. Y. Chen,J.D.Tygar, and W.Tzeng, “Secure group management using uni-directional proxy re-encryption schemes” IEEE INFOCOM, pp.1952-1960.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rashmi K, H. P. Mohan Kumar, " Block Design Key for Secure Data Sharing in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.369-374, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT1953107