SlideShare a Scribd company logo
A Secure Anti-Collusion Data Sharing Scheme for
Dynamic Groups in the Cloud
Abstract:
Benefited from cloud computing, users can achieve an effective and economical approach
for data sharing among group members in the cloud with the characters of low
maintenance and little management cost. Meanwhile, we must provide security
guarantees for the sharing data files since they are outsourced. Unfortunately, because of
the frequent change of the membership, sharing data while providing privacy-preserving
is still a challenging issue, especially for an untrusted cloud due to the collusion attack.
Moreover, for existing schemes, the security of key distribution is based on the secure
communication channel, however, to have such channel is a strong assumption and is
difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic
members. Firstly, we propose a secure way for key distribution without any secure
communication channels, and the users can securely obtain their private keys from group
manager. Secondly, our scheme can achieve fine-grained access control, any user in the
group can use the source in the cloud and revoked users cannot access the cloud again
after they are revoked. Thirdly, we can protect the scheme from collusion attack, which
means that revoked users cannot get the original data file even if they conspire with the
untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a
secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which
means previous users need not to update their private keys for the situation either a new
user joins in the group or a user is revoked from the group.
Existing System
In cloud computing, users can achieve an effective and economical approach for data
sharing among group members in the cloud with the characters of low maintenance and
little management cost. Meanwhile, we must provide security guarantees for the sharing
data files since they are outsourced. Unfortunately, because of the frequent change of the
membership, sharing data while providing privacy-preserving is still a challenging issue,
especially for an untrusted cloud due to the collusion attack. Moreover, for existing
schemes, the security of key distribution is based on the secure communication channel,
however, to have such channel is a strong assumption and is difficult for practice
Proposed System
proposed a secure provenance scheme by leveraging group signatures and ciphertext-
policy attribute-based encryption techniques [9]. Each user obtains two keys after the
registration while the attribute key is used to decrypt the data which isencrypted by the
attribute-based encryption and the group signature key is used for privacy-preserving and
traceability. However, the revocation is not supported in this scheme. We describe the
main design goals of the proposed scheme including key distribution, data
confidentiality, access control and efficiencywe propose a secure way for key distribution
without any secure communication channels, and the users can securely obtain their
private keys from group manager. Secondly, our scheme can achieve fine-grained access
control, any user in the group can use the source in the cloud and revoked users cannot
access the cloud again after they are revoked. Thirdly, we can protect the scheme from
collusion attack, which means that revoked users cannot get the original data file even if
they conspire with the untrusted cloud. In our approach, by leveraging polynomial
function, we can achieve a secure user revocation scheme. Finally, our scheme can
achieve fine efficiency, which means previous users need not to update their private keys
for the situation either a new user joins in the group or a user is revoked from the group.
Problem Statement
Data confidentiality requires that unauthorized users including the cloud are incapable of
learning the content of the stored data. To maintain the availability of data confidentiality
for dynamic groups is still an important and challenging issue. Specifically, revoked users
are unable to decrypt the stored data file after the revocation.
Scope
Cloud computing, users can achieve an effective and economical approach for data
sharing among group members in the cloud with the characters of low maintenance and
little management cost. Meanwhile, we must provide security guarantees for the sharing
data files since they are outsourced. Unfortunately, because of the frequent change of the
membership, sharing data while providing privacy-preserving is still a challenging issue,
especially for an untrusted cloud due to the collusion attack. Moreover, for existing
schemes, the security of key distribution is based on the secure communication channel,
however, to have such channel is a strong assumption and is difficult for practice. In this
paper, we propose a secure data sharing scheme for dynamic members. Firstly, we
propose a secure way for key distribution without any secure communication channels,
and the users can securely obtain their private keys from group manager. Secondly, our
scheme can achieve fine-grained access control, any user in the group can use the source
in the cloud and revoked users cannot access the cloud again after they are revoked.
Thirdly, we can protect the scheme from collusion attack, which means that revoked
users cannot get the original data file even if they conspire with the untrusted cloud. In
our approach, by leveraging polynomial function, we can achieve a secure user
revocation scheme. Finally, our scheme can achieve fine efficiency, which means
previous users need not to update their private keys for the situation either a new user
joins in the group or a user is revoked from the group. our scheme is able to support
dynamic groups efficiently, when a new user joins in the group or a user is revoked from
the group, the private keys of the other users do not need to be recomputed and updated.
Moreover, our scheme can achieve secure user revocation, the revoked users can not be
able to get the original data files once they are revoked even if they conspire with the
untrusted cloud.
Implementation of modules
Architecture:
Group Manager: Group manager takes charge of system parameters generation, user
registration, and user revocation. In the practical applications, the group manager usually
is the leader of the group. Therefore, we assume that the group manager is fully trusted
by the other parties.
Group members: Group members (users) are a set of registered users that will store their
own data into the cloud and share them with others. In the scheme, the group membership
is dynamically changed, due to the new user registration and user revocation.
We describe the main design goals of the proposed scheme including key distribution,
data confidentiality, access control and efficiency as follows:
Key Distribution: The requirement of key distribution is that users can securely obtain
their private keys from the group manager without any Certificate Authorities. In other
existing schemes, this goal is achieved by assuming that the communication channel is
secure, however, in our scheme, we can achieve it without this strong assumption.
Access control: First, group members are able to use the cloud resource for data storage
and data sharing. Second, unauthorized users cannot access the cloud resource at any
time, and revoked users will be incapable of using the cloud resource again once they are
revoked.
Data confidentiality: Data confidentiality requires that unauthorized users including the
cloud are incapable of learning the content of the stored data. To maintain the availability
of data confidentiality for dynamic groups is still an important and challenging issue.
Specifically, revoked users are unable to decrypt the stored data file after the revocation.
Efficiency: Any group member can store and share data files with others in the group by
the cloud. User revocation can be achieved without involving the others, which means
that the remaining users do not need to update their private keys.
Cloud module: cloud module plays an important role ,group managers upload some files
into cloud those files are stored in encrypted format because a secure access control
scheme on encrypted data in cloud storage by invoking role-based encryption technique.
It is claimed that the scheme can achieve efficient user revocation that combines role-
based access control policies with encryption to secure large data storage in the cloud.
Unfortunately, the verifications between entities are not concerned, the scheme easily
suffer from attacks, for example, collusion attack. Finally, this attack can lead to
disclosing sensitive data files. The cloud, maintained by the cloud service providers,
provides storage space for hosting data files in a pay-as-you-go manner. However, the
cloud is untrusted since the cloud service providers are easily to become untrusted.
Therefore, the cloud will try to learn the content of the stored data.
Algorithm: we propose a secure data sharing scheme, which can achieve secure key
distribution and data sharing for dynamic group. The below steps are included in this
algorithms,
1. We provide a secure way for key distribution without any secure communication
channels. The users can securely obtain their private keys from group manager without
any Certificate Authorities due to the verification for the public key of the user.
2. Our scheme can achieve fine-grained access control, with the help of the group user
list, any user in the group can use the source in the cloud and revoked users cannot access
the cloud again after they are revoked.
3. We propose a secure data sharing scheme which can be protected from collusion
attack. The revoked users can not be able to get the original data files once they are
revoked even if they conspire with the untrusted cloud. Our scheme can achieve secure
user revocation with the help of polynomial function.
4. Our scheme is able to support dynamic groups efficiently, when a new user joins in
the group or a user is revoked from the group, the private keys of the other users do not
need to be recomputed and updated.
5. We provide security analysis to prove the security of our scheme. In addition, we also
perform simulations to demonstrate the efficiency of our scheme.
Conclusion:
we design a secure anti-collusion data sharing scheme for dynamic groups in the cloud.
In our scheme, the users can securely obtain their private keys from group manager
Certificate Authorities and secure communication channels. Also, our scheme is able to
support dynamic groups efficiently, when a new user joins in the group or a user is
revoked from the group, the private keys of the other users do not need to be recomputed
and updated. Moreover, our scheme can achieve secure user revocation, the revoked
users can not be able to get the original data files once they are revoked even if they
conspire with the untrusted cloud.

More Related Content

PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PPTX
secure multi-owner data sharing for dynamic groups
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
secure multi-owner data sharing for dynamic groups

What's hot (18)

PPTX
Mona final review
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PPTX
Shared aythority ppt design [autosaved]
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Volume 2-issue-6-2073-2076
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
PDF
Iaetsd secure data sharing of multi-owner groups in cloud
PPT
Secure Data Sharing in Cloud (SDSC)
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
Iaetsd an efficient secure scheme for multi user in cloud
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Mona final review
Secure data sharing for dynamic groups in multi-owner using cloud
A cloud storage system for sharing data securely with privacy preservation an...
Shared aythority ppt design [autosaved]
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Volume 2-issue-6-2073-2076
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Iaetsd secure data sharing of multi-owner groups in cloud
Secure Data Sharing in Cloud (SDSC)
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Mona secure multi owner data sharing for dynamic groups in the cloud
Iaetsd an efficient secure scheme for multi user in cloud
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Ad

Similar to A secure anti collusion data sharing scheme for dynamic groups in the cloud (20)

PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
PDF
Volume 2-issue-6-2073-2076
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PPTX
A secure anti collision data sharing
PPTX
A secure anti collision data sharing scheme in dynamic groups in the cloud
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Encryption based multi user manner secured data sharing and storing in cloud
PDF
Encryption based multi user manner
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
PDF
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
DOCX
Smart Security For Data Sharing In Cloud Computing
DOCX
Smart Security For Data Sharing In Cloud Computing
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
Volume 2-issue-6-2073-2076
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
A secure anti collision data sharing
A secure anti collision data sharing scheme in dynamic groups in the cloud
Secure Data Sharing In an Untrusted Cloud
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner
Mona secure multi owner data sharing for dynamic groups in the cloud
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
Public integrity auditing for shared dynamic cloud data with group user revoc...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Public integrity auditing for shared dynamic cloud data with group user revoc...
Ad

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
01-Introduction-to-Information-Management.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Abdominal Access Techniques with Prof. Dr. R K Mishra
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
VCE English Exam - Section C Student Revision Booklet
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
2.FourierTransform-ShortQuestionswithAnswers.pdf

A secure anti collusion data sharing scheme for dynamic groups in the cloud

  • 1. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Abstract: Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group. Existing System
  • 2. In cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice Proposed System proposed a secure provenance scheme by leveraging group signatures and ciphertext- policy attribute-based encryption techniques [9]. Each user obtains two keys after the registration while the attribute key is used to decrypt the data which isencrypted by the attribute-based encryption and the group signature key is used for privacy-preserving and traceability. However, the revocation is not supported in this scheme. We describe the main design goals of the proposed scheme including key distribution, data confidentiality, access control and efficiencywe propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group. Problem Statement Data confidentiality requires that unauthorized users including the cloud are incapable of learning the content of the stored data. To maintain the availability of data confidentiality
  • 3. for dynamic groups is still an important and challenging issue. Specifically, revoked users are unable to decrypt the stored data file after the revocation. Scope Cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group. our scheme is able to support dynamic groups efficiently, when a new user joins in the group or a user is revoked from the group, the private keys of the other users do not need to be recomputed and updated. Moreover, our scheme can achieve secure user revocation, the revoked users can not be able to get the original data files once they are revoked even if they conspire with the untrusted cloud.
  • 4. Implementation of modules Architecture: Group Manager: Group manager takes charge of system parameters generation, user registration, and user revocation. In the practical applications, the group manager usually is the leader of the group. Therefore, we assume that the group manager is fully trusted by the other parties.
  • 5. Group members: Group members (users) are a set of registered users that will store their own data into the cloud and share them with others. In the scheme, the group membership is dynamically changed, due to the new user registration and user revocation. We describe the main design goals of the proposed scheme including key distribution, data confidentiality, access control and efficiency as follows: Key Distribution: The requirement of key distribution is that users can securely obtain their private keys from the group manager without any Certificate Authorities. In other existing schemes, this goal is achieved by assuming that the communication channel is secure, however, in our scheme, we can achieve it without this strong assumption. Access control: First, group members are able to use the cloud resource for data storage and data sharing. Second, unauthorized users cannot access the cloud resource at any time, and revoked users will be incapable of using the cloud resource again once they are revoked. Data confidentiality: Data confidentiality requires that unauthorized users including the cloud are incapable of learning the content of the stored data. To maintain the availability of data confidentiality for dynamic groups is still an important and challenging issue. Specifically, revoked users are unable to decrypt the stored data file after the revocation. Efficiency: Any group member can store and share data files with others in the group by the cloud. User revocation can be achieved without involving the others, which means that the remaining users do not need to update their private keys. Cloud module: cloud module plays an important role ,group managers upload some files into cloud those files are stored in encrypted format because a secure access control scheme on encrypted data in cloud storage by invoking role-based encryption technique. It is claimed that the scheme can achieve efficient user revocation that combines role-
  • 6. based access control policies with encryption to secure large data storage in the cloud. Unfortunately, the verifications between entities are not concerned, the scheme easily suffer from attacks, for example, collusion attack. Finally, this attack can lead to disclosing sensitive data files. The cloud, maintained by the cloud service providers, provides storage space for hosting data files in a pay-as-you-go manner. However, the cloud is untrusted since the cloud service providers are easily to become untrusted. Therefore, the cloud will try to learn the content of the stored data. Algorithm: we propose a secure data sharing scheme, which can achieve secure key distribution and data sharing for dynamic group. The below steps are included in this algorithms, 1. We provide a secure way for key distribution without any secure communication channels. The users can securely obtain their private keys from group manager without any Certificate Authorities due to the verification for the public key of the user. 2. Our scheme can achieve fine-grained access control, with the help of the group user list, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. 3. We propose a secure data sharing scheme which can be protected from collusion attack. The revoked users can not be able to get the original data files once they are revoked even if they conspire with the untrusted cloud. Our scheme can achieve secure user revocation with the help of polynomial function. 4. Our scheme is able to support dynamic groups efficiently, when a new user joins in the group or a user is revoked from the group, the private keys of the other users do not need to be recomputed and updated.
  • 7. 5. We provide security analysis to prove the security of our scheme. In addition, we also perform simulations to demonstrate the efficiency of our scheme. Conclusion: we design a secure anti-collusion data sharing scheme for dynamic groups in the cloud. In our scheme, the users can securely obtain their private keys from group manager Certificate Authorities and secure communication channels. Also, our scheme is able to support dynamic groups efficiently, when a new user joins in the group or a user is revoked from the group, the private keys of the other users do not need to be recomputed and updated. Moreover, our scheme can achieve secure user revocation, the revoked users can not be able to get the original data files once they are revoked even if they conspire with the untrusted cloud.