Privacy Data Sharing for a Group of Members in the Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : YaragallaSarat Babu, JayanthiRao Madina


YaragallaSarat Babu, JayanthiRao Madina"Privacy Data Sharing for a Group of Members in the Cloud", International Journal of Engineering Trends and Technology (IJETT), V17(6),266-269 Nov 2014. ISSN:2231-5381. published by seventh sense research group


Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharingof data in the cloud is very securely and also provide the authentication of users in the cloud. In this paper we are proposed the concept digital certificate for user authentication and key establishment by providing security of data in the cloud we are using Triple Des for encryption and decryption of data. So that by using those techniques we can provide more security and low maintenance of characteristics.


[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H.Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I.Stoica, and M. Zaharia,“Above the clouds: A Berkeley view of cloud computing,” University ofCalifornia,Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
[2] Amazon Web Services (AWS), Online at
[3] Google App Engine, Online at
[4] Microsoft Azure,
[5] 104th United States Congress, “Health InsurancePortability and AccountabilityAct of 1996 (HIPPA),” Online at, 1996.
[6] H. Harney, A. Colgrove, and P. D. McDaniel,“Principles of policy insecure groups,” in Proc.OfNDSS’01, 2001.
[7] P. D. McDaniel and A. Prakash, “Methods andlimitations of securitypolicy reconciliation,” in Proc. Of0 SP’02, 2002.
[8] T. Yu and M. Winslett, “A unified scheme for resourceprotection inautomated trust negotiation,” in Proc.OfSP’03, 2003.
[9] J. Li, N. Li, and W. H. Winsborough, “Automated trustnegotiationusing cryptographic credentials,” in Proc. OfCCS’05, 2005.
[10] J. Anderson, “Computer Security TechnologyPlanning Study,” AirForce Electronic Systems Division,Report ESD-TR-73-51, 1972,