Secure Key Distribution and Data Sharing for Dynamic Groups in Multiple Clouds

Smita Bhosale, Anil Gujar

Abstract


Today, use of cloud computing is rapidly growing for
several purposes, mainly for large data storage and sharing data
in clouds. Here, users can share data for dynamic groups with
cost-effectively. Membership is frequently changing in a cloud.
The Existing system is using the protected (secure) commutation
channel for data sharing. This implementation is difficult for
practice. Still, the existing system is suffering from collusion
attack and insecure key distribution with a single cloud. There
is no assurance of the data confidentiality and accessibility. In
the proposed system, multiple cloud services are used to store
data. The System is proposing a safe way for key distribution
without using any protected communication channels, and the
user can safely get their private keys from group administrators
(managers).Any users in the gathering can use the source in
the cloud and denied users cannot get to the cloud once more.
The system provides fine-grained access control. Also, the system
supports the anti-collusion attack with an untrustworthy cloud.
Our system is proposing triple levels of encryption techniques and
a file is stored in a split format on multiple clouds in different
groups using a hybrid cloud. The system is providing secure
revocation.

Full Text:

PDF

References


Zhongma Zhu and Rui Jiang, Secure Anti-Collusion Data Sharing Scheme

for Dynamic Groups in the Cloud IEEE Transaction Parallel Distribution

System, Jan. 2016.

. Liu, Y. Zhang, B. Wang, and J. Yang, Mona: A secure multi-owner data

sharing for the dynamic groups in the cloud. IEEE Transaction Parallel

Distribution System, Jun. 2013.

Z. Zhu, Z. Jiang, and R. Jiang The attack on Mona: Secure multi-owner

data sharing for dynamic groups in the cloud, International Conference

Inf. Sci. Cloud Compute 2013.

L. Zhou, V. Varadharajan, and M. Hitchens Achieving a secure role-based

access control on encrypted data in cloud storage. IEEE Transaction. Inf.

Forensics Security, Dec. 2013.

M. Nabeel, N. Shang, and E. Bertino, A Privacy preserving policy based

content sharing in public clouds. IEEE Transaction, Nov. 2013.

Nesrine Kaaniche1, Aymen Boudguiga, Maryline Laurent1, ID-Based

Cryptography for a Secure Cloud Data Storage. IEEE Cloud computing,

M. Armbrust and M. Zaharia A view of cloud computing. Communication

ACM, April 2010.

S. Kamara and Lauter, Cryptographic cloud storage. in International

Conferenec, Financial Cryptography Data Security, Jan. 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving a secure, scalable, and

fine-grained data access control in cloud computing.ACM Symp. 2010.

R. Lu, X. Lin, X. Liang, and X. Shen, A Secure provenance-The

essential of bread and butter of a data forensics in cloud computing.

In ACM Symp. Inf. Compute. Communication and Security, 2010.

B. Waters, Ciphertext-policy attribute based encryption- An expressive,

efficient and provably secure realization. in International conference on

public key cryptography 2008.

Kallahalla and K. Fu, Plutus-A Scalable secure file sharing on untrusted

storage.In USENIX Conference on File Storage Technology 2003.




 

Copyright © IJETT, International Journal on Emerging Trends in Technology