Secure Sharing of Data for Dynamic Group in Cloud Storage Application

Authors

  • Dr. Dhanaraj Cheelu  Professor, Department of CSE, Dr. K. V. Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India
  • K. V. Uma Maheswari  M.Tech, Department of CSE, Dr. K. V. Subba Reddy Institute of Technology, Kurnool, Andhra Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT217299

Keywords:

Data Sharing, Group Key Management, Dynamic Group, Security

Abstract

Data sharing is increasingly important for many users and sometimes an essential requirement, especially for industries and society’s used to gain proceeds. Sharing group resource among cloud users is a major problem, still the data privacy leak. The existing system Group Key Management method used for sharing Key Generation and distribution in the group member or users. Sometimes change to user one group to another group, the group key to enable authenticated users to access the files securely and efficiently is still a challenging problem. This problem to avoid that sharing data in group using the Time Based Group Key Management (TGKM) techniques for cryptographic cloud storage application , which Conditional Identity Based Broadcast Proxy Re-Encryption (CIBPRE) used to transforming the data’s(files) major process in cloud server. To Key Generation method for user a time based dynamic group Key which capably to make stronger in cloud security. Generally, security and performance evaluated that the proposed scheme is highly efficient and satisfies the security requirements for cloud based application.

References

  1. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable and fine-grained data accesscontrol in cloud computing. In: Proceedings of IEEE INFOCOM 2010, pp. 15–19 (2010).
  2. Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: NDSS 2003 (2003).
  3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: NDSS 2005 (2005)
  4. Bethencourt, J., Sahai, A., Waters, B.: CiphertextPolicy Attribute-Based Encryption. In: 28th IEEE Symposium on Security and Privacy 2007, pp. 321–334 (2007)
  5. Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., 2010 Workshops. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010).
  6. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014).
  7. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," Proc. 10th Int'l Conf. Applied Cryptography and Network Security, pp. 507-525, 2012.
  8. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing," in the Proceedings of IEEE INFO-COM 2010, 2010, pp. 525–533.
  9. B. Wang, B. Li, and H. Li, “Panda: Public Auditing For Shared Data with Efficient User Revocation in The Cloud" IEEE Trans. Services Computing, Dec.2013.
  10. Kim, Y., Perrig, A., Tsudik, G.: Tree based group key agreement. ACM Trans. Inf. Syst.Secur. 7(1), 60–96 (2004).
  11. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.:Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst. 22(5),847–859 (2011).
  12. Hong, C., lv, Z., Zhang, M., Feng, D.: A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage. In: Wang, H., Li, S., Oyama, S., Hu, X., Qian, T.(eds.) WAIM 2011. LNCS, vol. 6897, pp. 264–276. Springer, Heidelberg (2011).
  13. Jian Weng, Robert H. Deng, Xuhua Ding, Cheng- Kang Chu, and Junzuo Lai,“ Conditional proxy reencryption secure against chosen ciphertext attack", In ASIACCS,2009,pp. 322-332.
  14. Tao Jiang, Xiaofeng Chen, and Jianfeng Ma,“Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation", IEEE Transactions on Computers 2015.
  15. Kaiping Xue, Peilin Hong," A Dynamic Secure Group Sharing Framework In Public Cloud Computing" Ieee Transactions On Cloud Computing, Vol. 2, No. 4, October-December 2014 459.
  16. Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1), 60–96 (2004).
  17. Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Weng, “Cloud based data sharing with fine- grained proxy re-encryption" Pervasive and Mobile computing 2015.
  18. V. Goyal, O. Pandey, A. Sahai, and B.Waters" Attribute based encryption for fine grained access control of encrypted data," in Proceedings of the13th ACM conference on Computer and communications security , pp. 89{98, 2006} .

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Dhanaraj Cheelu, K. V. Uma Maheswari, " Secure Sharing of Data for Dynamic Group in Cloud Storage Application, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.563-569, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT217299