A Safe Policy Based Data Sharing Scheme for Dynamic Groups in the Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-46 Number-2
Year of Publication : 2017
Authors : R.Aiswarya, M.Nikitha, N.Rama Kalpana
DOI :  10.14445/22315381/IJETT-V46P212

Citation 

R.Aiswarya, M.Nikitha, N.Rama Kalpana "A Safe Policy Based Data Sharing Scheme for Dynamic Groups in the Cloud", International Journal of Engineering Trends and Technology (IJETT), V46(2),67-70 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
In cloud providing securities, the users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Then, security certifications to the sharing information records will be given since they are outsourced. In addition, for the existing plans, the security of key distribution is based on secure communication channel.[1] In this paper we propose a safe information sharing plan for every individual in the group. Firstly, we propose a safe route for key distribution with no safe correspondence channels, and the group members can safely obtain their private key from group manager. Second, we use fine-grained access control, any user in the group can use the sources in the cloud and the revoked users cannot access the cloud again after they are revoked from the group. Third, we can protect the stored data files from collusion attack, so that the revoked users cannot access the original data files even if they have the plan with un-trusted cloud. In this we use polynomial function for secure user revocation and good efficiency. It means old user in the group need not renew their private keys when a new user is added into the group or a user is revoked from the group.

 References

[1] Zhongma Zhu and Rui Jiang: A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud, IEEE transactions on parallel and distributed systems, vol. 27, no. 1, january 2016
[2] X.Liu,B.Wang,Y.Zhang and J.Yan, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,IEEE Computer Society, vol. 24,no. 6,June. 2013.
[3] Lan Zhou, Vijay Varadharajan, and Michael Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage, “IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1947-1960, December 2013.
[4] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proc. of FC, January 2010, pp. 136-149.
[5] T. Jiang, X. Chen, and J. Ma,”Public Integrity Auditing for shared Dynamic Cloud Data with Group User Revocation”, IEEE Trans on Computers, 2015.
[6] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.
[7] Kishor Kumar E D, Dara Raju: Secured Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud, Vol. 4, Issue 9, September 2016
[8] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully Collusion Secure Dynamic Broadcast Encryption with ConstantSizeCiphertexts or Decryption Keys,” in Proc. of Pairing, 2007, pp.39-59
[9] J.Kar,“Low Cost Scalar Multiplication Algorithms for Constrained Devices”, International Journal of Pure and Applied Mathematics, vol.102, no.3, pp.579-592.
[10] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing”, in Proc. of AISIACCS, 2010, pp. 282-292.
[11] V.Sathana and J.Shanthini: Enhanced Security System for Dynamic Group in Cloud, Volume 4, Issue 3,March 2014. [12] Smita S. Bhosale, Anil D.Gujar: Secure Key Distribution and Data Sharing for Dynamic Groups in Multiple Cloud, Vol. 4, Issue 12, December 2016,pp.21301-21303
[13] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.2010.
[14] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98, 2006.
[15] Shucheng Yu, Cong Wang, Kui Ren, and Weijing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

Keywords
Data Sharing, Cloud Computing, AES Algorithm, Ring Signature.