SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 106
AN EFFICIENT SCHEME FOR DATA SHARING AMONG DYNAMIC CLOUD
MEMBERS
Mahejuba Soudagar1, Rajashekhar D. Salagar2
1M.Tech Student, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of
Engineering & Technology Vijayapur, Karnataka, India
2Assistant Professor, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of
Engineering & Technology Vijayapur, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cloud Computing, has the properties of sharing
information and the cost of management maintainenceisless.
Cloud Computing provides a high usage of resource. Sharing
the data along with giving privacy is a challenging issue
because of the frequent change in membership. In this
research work, we propose a scheme for sharing data which is
secure for dynamic members. First, key distribution method is
proposed withoutanycommunicationchannels, andtheGroup
Managers provide keys to users. Second, fine grained access
control can be achieved, cloud data can be used by any user
within the cloud and users who are revoked cannot access the
cloud. Third, the scheme is protected from collusion attack, i.e
revoked users after they are revoked won’t be able to get the
original data even if they join with the third party cloud.
Key Words: key distribution, privacy-preserving, fine
grained access control (FGAC).
1. INTRODUCTION
Cloud Computing, has the properties of sharing information
and the cost of management maintenance is less. Cloud
Computing provides a high usage of resource, It is the next
most important step in the evolution of information
technology, which includes many of and new and already
existing technologies such as SOAs(Service Oriented
Architecture) and virtualization. However, data shared in
cloud usually contains personal information (such as
personal profile, financial data, health records, etc.) and
hence it must be well secured. Since we obtain data from
third party servers, which is sensitive to cloud providers so
security is the main constraint. A common method to
maintain data privacy is encrypting data files before
uploading it to cloud[2]. However, it is difficult to have such
a scheme, especially for groups in the cloud.
A secured storage system which provides cryptography is
used which gives a data sharing scheme on untrustworthy
servers which is based on some techniques which includes
encryption that is encryption is performed on separate
single file group using file block key, and dividing the data
files into separate file groups. But for revocation of usersthe
keys of file-block should be distributed and updated. The
complexities of user revocation and participation in these
schemes are increasing with the number of revoked users
and the data owners
These are the main offerings of our scheme:
1) This scheme gives a secure method of key distribution
without using any secure channels. Theregisteredusers
here obtain their private keys without using any
certificate authoritiessecurelyfromthegroupmanagers
2) Fine-grained access control can be achieved using this
scheme, also any registered user present in the group
can use the cloud resource using the group user list and
the users who are revoked won’t be able to get the data
from cloud after they are revoked.
3) The main benefit of this scheme is that data is secure
from collusion attack also the data sharing process is
safe and secure. Once any user is revoked he cannot
obtain the originally existing data file even if they join
hands with third party servers.
4) Dynamic groups can be handled efficiently by our
scheme, so whenever any user gets added in group or a
user is revoked who has already joined, other user’s
private keys need not be computed and updated again.
2. LITERATURE SURVEY
A. Survey on: Cryptographic Cloud Storage: We look into
the difficulty of constructing a service of secure cloud
storage on the peak of public cloud architecturewhereclient
does not trust the cloud service provider. Cloud storage can
be grouped into two types as private and public cloud
[1].The customer owns the private cloud and only trusted
bodies have access to the private cloud. The cloud service
provider owns the public cloud where data is out of control
and could be attacked by third parties.
B. Survey on: Improved Proxy Re-Encryption Schemes
with Applications to Secure DistributedStorage:In1998,
Blaze, Bloomer, and Strauss (BBS) proposed an application
called atomic proxy re-encryption, in which a semi-trusted
proxy converts a ciphertext for Alice into a ciphertext for
Bob without seeing the underlying plaintext. Proxy re-
encryption[3] allows a proxy to transform a ciphertext
computed under Alice’s public key into one that can be
opened by Bob’s secret key, but this method isnotsecure[2].
The primary advantage of our schemes is that they are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 107
unidirectional (i.e., Alice can delegate to Bob without Bob
having to delegate to her) and do not require delegators to
reveal all of their secret key to anyone – or even interact
with the delegate – in order to allow a proxy to re-encrypt
their ciphertexts.
C. Survey on: Mona:SecureMulti-Owner DataSharing for
Dynamic Groups in the Cloud: Sharing data in a multi-
owner way while preserving data and from an untrusted
cloud is still a challenging issue, mainly due to the frequent
change of the membership. To preserve data privacy, a
simple solution is encrypting data files, and then uploading
the encrypted data into the cloud. Thus to achieve the
reliable and scalable in MONA[4], in this paper we are
presenting new framework for MONA. Inthismethod we are
also presenting how to manage the risks like failureofgroup
manager by increasing the number of backup group
manager, hanging of group manager in case number of
requests more by sharing the workload in multiple group
managers.
3. EXISTING SYSTEM
The existing methods to retrieve the fine grain data access
control of key policy attribute is based on“encryption,proxy
re-encryption and lazy re-encryption [9]”. It does not reveal
any information about the data. But any group member can
utilize the cloud service for storing and sharing data that
may hide the implementation of applications. One methodis
to provide group signatures and encryption methods for a
secure scheme. After registration every user will get two
keys one for encryption and other for decryption which is
attribute key[5]. A secure way of using encrypted file is by
role based encryption algorithms. This scheme is efficient
scheme in terms of storage for user revocation that
combines encryption with role based accesscontrol policies.
However verification of users are not taken into view. In the
proposed system every user gets verified by the cloud
admin.
3.1 Disadvantage in existing system:
 A secure and efficient data sharing scheme is difficult to
design.
 Key distribution overhead is large.
 The verifications of users are not done so it leads to
collusion attack
 There is a weak protection of commitment in the stage
of identity token. So it is unsecure.
4. THE PROPOSED SCHEME
4.1 Preliminaries
1)(Basic Diffe-Hellman Problem (BDHP) Assumption
[6]): Specified base point P and a value γ € It is easy to
calculate γ.P. However, given P,γ.P,itisinfeasibletocalculate
γ since of the discrete algorithm problem.
2)(Decisional Diffie-Hellman Problem (DDHP)
Assumption [7]):
Notation Description
IDEi the identity of user i
IDdatai the identity of data i
qk the public key of the user
tk the private that Needs to be negotiated
with the group manager
KEY=(xi,Ai,B) the private key which is Distributed to the
user from the Group manger and used for
data Sharing
base point Q is infeasible to compute b Q.
and aQ,(a+b)Q
Definition 3 (Weak Bilinear Diffie-Hellman Exponent
[8])
Encpk(): Symmetric encryption algorithm used in the
encryption key k
ASENC(): Asymmetric encryption Algorithm used in the
encryption key ULI group user list DLI data list[6]
4.2 ALGORITHM/TECHNIQUE USED:
Elliptic Curve Cryptography (ECC): was discovered in 1985
by Victor Miller (IBM) and Neil Koblitz (University of
Washington) as an alternative mechanism forimplementing
public-key cryptography.
The equation of an elliptic curve is given as, y2=x3 + ax + b
Few terms that will be used
E -> Elliptic Curve
P -> Point on the Curve
N -> Maximum limit (Prime number)
Key Generation: Key generation creates both public key
and private key. The sender will be encrypting the message
with receiver’s public keyandthereceiver will decryptusing
its private key. Now, we have to select a number ‘d’ within
the range of ‘n’.
Using the following equation we can generate the public key
Q = d * P.
d = The random number that we have selected within the
range of (1 to n-1). P is the point on the curve. ‘Q’ is the
public key and ‘d’ is the private key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 108
1) Encryption: Let ‘m’ be the message that we are
transferring. We should represent this onthecurve. Thishas
in-depth implementationdetails.All theadvanceresearchon
ECC is done by a company called certicom. Consider ‘m’ has
the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from [1 –
(n-1)].
Two cipher texts gets generated let it be C1 and C2.
C1 = k*P and C2 = M + k*Q. C1 and C2 are sent.
2) Decryption: We have to get back the message ‘m’ that
was sent to us, M = C2 – d * C1
M is the original message that we have sent.
4.3 SYSTEM ARCHITECTURE:
Fig -1: System Architecture
Shown in Fig. 1 above, there are 3 different entities included
under the system model: the cloud, a group manager and
many group members.
 The cloud It is the storage space available to the users
on payment basis. It is maintained by the CSP. This
becomes untrusted since CSP can be easily untrusted.
 Group manager is the one whohastheauthorityofnew
user registration with the group anduserrevocation.He
is the owner of the group so he is fully trustable.
 Group members or group (users) are the one that are
registered by group manager. He can store their own
data into the cloud and share them with other cloud
member. Due to the new user registration and user
revocation, the group membership varies vigorously.
4.4 Design Goals
Important design goals of our scheme are:
1) Key distribution: The users can get their private keys
from the group manager securely. This is key
distributions which do not need any certificates
authorities or channel. In other systems a secure
communication channel is required
2) Access control: Access control includes three main
points. First, Members within the group can utilize the
resources provided by cloud for storing and sharing
data. Second, the users who are not authorized wont be
able to utilize the resources of cloud. The revoked users
also cannot use resources after being revoked
3) Data confidentiality: Data confidentiality means that
unauthorized users including the cloud should not be
able to learn information stored in cloud. However
preserving the data confidentiality is a challengingissue
for dynamic groups. Revoked users cannot decrypt the
data after the revocation.
4) Efficiency: Main requirement of efficiency is that any
group member can save the data files or share the data
files with other group members of the cloud. Alsohereit
is very easy to revoke users without informing others
that is users need not update their keys.
5. ADVANTAGES
 The cost is not dependent on the number of the revoked
users. Because file uploads cost computation is
dependent on two signature verifications. These
signature verifications are irrelevanttonumberofusers
revoked. In RBAC scheme the cost of computation is
small because communication verification is not
concerned. In our scheme, securely the users can get their private
keys from group manager Certificate Authorities. Also,
our scheme can maintain dynamic groups efficiently,
whenever new users connect to the group, the other
users’ private keys need not to be recalculated and
updated.
6. CONCLUSION
We have proposed a secure anti-collusion scheme for data
sharing among dynamic groups in the cloud which is an
efficient method. Here in this scheme, users can get hold of
their private keys securely from group manager, secure
communication channels and certificate Authorities. Our
scheme also supports dynamic groups very efficiently, the
private keys of the other users need not to be computed
again and updated when a new user register in the group or
an existing user is exited from the group. However, our
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 109
scheme achieves secure user revocation, the revoked users
cannot obtain the original data after they are removed or
exited even if they joins with the untrusted 3rd parties.
REFERENCES
[1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,”
Proc. Int’l Conf. Financial Cryptography and Data Security
(FC), pp.136- 149, Jan. 2010.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure,
scalable, and fine-grained data access control in cloud
computing,” in Proc. ACM Symp. Inf., Comput. Commun.
Security, 2010, pp. 282–292.
[3] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxyre-encryptionschemeswithapplicationsto
secure distributed storage,” in Proc. Netw. Distrib. Syst.
Security Symp., 2005, pp. 29–43.
[4] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure
multiowner data sharing for dynamic groups in the cloud,”
IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182–
1191, Jun. 2013.
[5] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure
multiowner data sharing for dynamic groupsinthecloud,”in
Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185–
189.
[6] B. Den Boer, “Diffie–Hellman is as strong as discrete log
for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530.
[7] D. Boneh, X. Boyen, and H. Shacham, “Short group
signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology,
2004, pp. 41–55.
[8] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity
based encryption with constant size ciphertext,” in Proc.
Annu. Int. Conf. TheoryAppl. Cryptographic Techn.,2005, pp.
440–456.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proc. ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.z

More Related Content

PDF
IRJET- Comparison Among RSA, AES and DES
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
PDF
Ijariie1196
PDF
Ijarcet vol-2-issue-7-2232-2235
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
PDF
Image Cryptography using RSA Algorithm
IRJET- Comparison Among RSA, AES and DES
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Ijariie1196
Ijarcet vol-2-issue-7-2232-2235
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Improving Efficiency of Security in Multi-Cloud
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
Image Cryptography using RSA Algorithm

What's hot (20)

PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PDF
IRJET- Secure File Storage on Cloud using Cryptography
PDF
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
PDF
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
PDF
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
PDF
50120140507006
PDF
IRJET- Data Transmission using RSA Algorithm
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
PDF
A secure key computation protocol for secure group communication with passwor...
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
PDF
Ijcnc050208
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
Comparison of data security in grid and cloud
PDF
IJSRED-V2I3P52
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
50120140507006
IRJET- Data Transmission using RSA Algorithm
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A secure key computation protocol for secure group communication with passwor...
IRJET- Securing Cloud Data Under Key Exposure
Secure Data Storage on Cloud System for Privacy Preserving
IRJET- Data Security in Cloud Computing through AES under Drivehq
Ijcnc050208
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Comparison of data security in grid and cloud
IJSRED-V2I3P52
Ad

Similar to An Efficient Scheme for Data Sharing Among Dynamic Cloud Members (20)

PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
PDF
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
Anonymous Key Based Secure File Encryption in Cloud
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Cloud Auditing With Zero Knowledge Privacy
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Anonymous Key Based Secure File Encryption in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Efficient and Empiric Keyword Search Using Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
web development for engineering and engineering
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Well-logging-methods_new................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Geodesy 1.pptx...............................................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
additive manufacturing of ss316l using mig welding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
web development for engineering and engineering
Embodied AI: Ushering in the Next Era of Intelligent Systems
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
Operating System & Kernel Study Guide-1 - converted.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mechanical Engineering MATERIALS Selection
Well-logging-methods_new................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
Geodesy 1.pptx...............................................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

An Efficient Scheme for Data Sharing Among Dynamic Cloud Members

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 106 AN EFFICIENT SCHEME FOR DATA SHARING AMONG DYNAMIC CLOUD MEMBERS Mahejuba Soudagar1, Rajashekhar D. Salagar2 1M.Tech Student, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of Engineering & Technology Vijayapur, Karnataka, India 2Assistant Professor, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of Engineering & Technology Vijayapur, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing, has the properties of sharing information and the cost of management maintainenceisless. Cloud Computing provides a high usage of resource. Sharing the data along with giving privacy is a challenging issue because of the frequent change in membership. In this research work, we propose a scheme for sharing data which is secure for dynamic members. First, key distribution method is proposed withoutanycommunicationchannels, andtheGroup Managers provide keys to users. Second, fine grained access control can be achieved, cloud data can be used by any user within the cloud and users who are revoked cannot access the cloud. Third, the scheme is protected from collusion attack, i.e revoked users after they are revoked won’t be able to get the original data even if they join with the third party cloud. Key Words: key distribution, privacy-preserving, fine grained access control (FGAC). 1. INTRODUCTION Cloud Computing, has the properties of sharing information and the cost of management maintenance is less. Cloud Computing provides a high usage of resource, It is the next most important step in the evolution of information technology, which includes many of and new and already existing technologies such as SOAs(Service Oriented Architecture) and virtualization. However, data shared in cloud usually contains personal information (such as personal profile, financial data, health records, etc.) and hence it must be well secured. Since we obtain data from third party servers, which is sensitive to cloud providers so security is the main constraint. A common method to maintain data privacy is encrypting data files before uploading it to cloud[2]. However, it is difficult to have such a scheme, especially for groups in the cloud. A secured storage system which provides cryptography is used which gives a data sharing scheme on untrustworthy servers which is based on some techniques which includes encryption that is encryption is performed on separate single file group using file block key, and dividing the data files into separate file groups. But for revocation of usersthe keys of file-block should be distributed and updated. The complexities of user revocation and participation in these schemes are increasing with the number of revoked users and the data owners These are the main offerings of our scheme: 1) This scheme gives a secure method of key distribution without using any secure channels. Theregisteredusers here obtain their private keys without using any certificate authoritiessecurelyfromthegroupmanagers 2) Fine-grained access control can be achieved using this scheme, also any registered user present in the group can use the cloud resource using the group user list and the users who are revoked won’t be able to get the data from cloud after they are revoked. 3) The main benefit of this scheme is that data is secure from collusion attack also the data sharing process is safe and secure. Once any user is revoked he cannot obtain the originally existing data file even if they join hands with third party servers. 4) Dynamic groups can be handled efficiently by our scheme, so whenever any user gets added in group or a user is revoked who has already joined, other user’s private keys need not be computed and updated again. 2. LITERATURE SURVEY A. Survey on: Cryptographic Cloud Storage: We look into the difficulty of constructing a service of secure cloud storage on the peak of public cloud architecturewhereclient does not trust the cloud service provider. Cloud storage can be grouped into two types as private and public cloud [1].The customer owns the private cloud and only trusted bodies have access to the private cloud. The cloud service provider owns the public cloud where data is out of control and could be attacked by third parties. B. Survey on: Improved Proxy Re-Encryption Schemes with Applications to Secure DistributedStorage:In1998, Blaze, Bloomer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. Proxy re- encryption[3] allows a proxy to transform a ciphertext computed under Alice’s public key into one that can be opened by Bob’s secret key, but this method isnotsecure[2]. The primary advantage of our schemes is that they are
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 107 unidirectional (i.e., Alice can delegate to Bob without Bob having to delegate to her) and do not require delegators to reveal all of their secret key to anyone – or even interact with the delegate – in order to allow a proxy to re-encrypt their ciphertexts. C. Survey on: Mona:SecureMulti-Owner DataSharing for Dynamic Groups in the Cloud: Sharing data in a multi- owner way while preserving data and from an untrusted cloud is still a challenging issue, mainly due to the frequent change of the membership. To preserve data privacy, a simple solution is encrypting data files, and then uploading the encrypted data into the cloud. Thus to achieve the reliable and scalable in MONA[4], in this paper we are presenting new framework for MONA. Inthismethod we are also presenting how to manage the risks like failureofgroup manager by increasing the number of backup group manager, hanging of group manager in case number of requests more by sharing the workload in multiple group managers. 3. EXISTING SYSTEM The existing methods to retrieve the fine grain data access control of key policy attribute is based on“encryption,proxy re-encryption and lazy re-encryption [9]”. It does not reveal any information about the data. But any group member can utilize the cloud service for storing and sharing data that may hide the implementation of applications. One methodis to provide group signatures and encryption methods for a secure scheme. After registration every user will get two keys one for encryption and other for decryption which is attribute key[5]. A secure way of using encrypted file is by role based encryption algorithms. This scheme is efficient scheme in terms of storage for user revocation that combines encryption with role based accesscontrol policies. However verification of users are not taken into view. In the proposed system every user gets verified by the cloud admin. 3.1 Disadvantage in existing system:  A secure and efficient data sharing scheme is difficult to design.  Key distribution overhead is large.  The verifications of users are not done so it leads to collusion attack  There is a weak protection of commitment in the stage of identity token. So it is unsecure. 4. THE PROPOSED SCHEME 4.1 Preliminaries 1)(Basic Diffe-Hellman Problem (BDHP) Assumption [6]): Specified base point P and a value γ € It is easy to calculate γ.P. However, given P,γ.P,itisinfeasibletocalculate γ since of the discrete algorithm problem. 2)(Decisional Diffie-Hellman Problem (DDHP) Assumption [7]): Notation Description IDEi the identity of user i IDdatai the identity of data i qk the public key of the user tk the private that Needs to be negotiated with the group manager KEY=(xi,Ai,B) the private key which is Distributed to the user from the Group manger and used for data Sharing base point Q is infeasible to compute b Q. and aQ,(a+b)Q Definition 3 (Weak Bilinear Diffie-Hellman Exponent [8]) Encpk(): Symmetric encryption algorithm used in the encryption key k ASENC(): Asymmetric encryption Algorithm used in the encryption key ULI group user list DLI data list[6] 4.2 ALGORITHM/TECHNIQUE USED: Elliptic Curve Cryptography (ECC): was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) as an alternative mechanism forimplementing public-key cryptography. The equation of an elliptic curve is given as, y2=x3 + ax + b Few terms that will be used E -> Elliptic Curve P -> Point on the Curve N -> Maximum limit (Prime number) Key Generation: Key generation creates both public key and private key. The sender will be encrypting the message with receiver’s public keyandthereceiver will decryptusing its private key. Now, we have to select a number ‘d’ within the range of ‘n’. Using the following equation we can generate the public key Q = d * P. d = The random number that we have selected within the range of (1 to n-1). P is the point on the curve. ‘Q’ is the public key and ‘d’ is the private key.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 108 1) Encryption: Let ‘m’ be the message that we are transferring. We should represent this onthecurve. Thishas in-depth implementationdetails.All theadvanceresearchon ECC is done by a company called certicom. Consider ‘m’ has the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from [1 – (n-1)]. Two cipher texts gets generated let it be C1 and C2. C1 = k*P and C2 = M + k*Q. C1 and C2 are sent. 2) Decryption: We have to get back the message ‘m’ that was sent to us, M = C2 – d * C1 M is the original message that we have sent. 4.3 SYSTEM ARCHITECTURE: Fig -1: System Architecture Shown in Fig. 1 above, there are 3 different entities included under the system model: the cloud, a group manager and many group members.  The cloud It is the storage space available to the users on payment basis. It is maintained by the CSP. This becomes untrusted since CSP can be easily untrusted.  Group manager is the one whohastheauthorityofnew user registration with the group anduserrevocation.He is the owner of the group so he is fully trustable.  Group members or group (users) are the one that are registered by group manager. He can store their own data into the cloud and share them with other cloud member. Due to the new user registration and user revocation, the group membership varies vigorously. 4.4 Design Goals Important design goals of our scheme are: 1) Key distribution: The users can get their private keys from the group manager securely. This is key distributions which do not need any certificates authorities or channel. In other systems a secure communication channel is required 2) Access control: Access control includes three main points. First, Members within the group can utilize the resources provided by cloud for storing and sharing data. Second, the users who are not authorized wont be able to utilize the resources of cloud. The revoked users also cannot use resources after being revoked 3) Data confidentiality: Data confidentiality means that unauthorized users including the cloud should not be able to learn information stored in cloud. However preserving the data confidentiality is a challengingissue for dynamic groups. Revoked users cannot decrypt the data after the revocation. 4) Efficiency: Main requirement of efficiency is that any group member can save the data files or share the data files with other group members of the cloud. Alsohereit is very easy to revoke users without informing others that is users need not update their keys. 5. ADVANTAGES  The cost is not dependent on the number of the revoked users. Because file uploads cost computation is dependent on two signature verifications. These signature verifications are irrelevanttonumberofusers revoked. In RBAC scheme the cost of computation is small because communication verification is not concerned. In our scheme, securely the users can get their private keys from group manager Certificate Authorities. Also, our scheme can maintain dynamic groups efficiently, whenever new users connect to the group, the other users’ private keys need not to be recalculated and updated. 6. CONCLUSION We have proposed a secure anti-collusion scheme for data sharing among dynamic groups in the cloud which is an efficient method. Here in this scheme, users can get hold of their private keys securely from group manager, secure communication channels and certificate Authorities. Our scheme also supports dynamic groups very efficiently, the private keys of the other users need not to be computed again and updated when a new user register in the group or an existing user is exited from the group. However, our
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 109 scheme achieves secure user revocation, the revoked users cannot obtain the original data after they are removed or exited even if they joins with the untrusted 3rd parties. REFERENCES [1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp.136- 149, Jan. 2010. [2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [3] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxyre-encryptionschemeswithapplicationsto secure distributed storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43. [4] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure multiowner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182– 1191, Jun. 2013. [5] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure multiowner data sharing for dynamic groupsinthecloud,”in Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185– 189. [6] B. Den Boer, “Diffie–Hellman is as strong as discrete log for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530. [7] D. Boneh, X. Boyen, and H. Shacham, “Short group signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology, 2004, pp. 41–55. [8] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Proc. Annu. Int. Conf. TheoryAppl. Cryptographic Techn.,2005, pp. 440–456. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.z