A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud

Sunita Patil, Supriya Bhosale, Sachin Patil

Abstract


This paper highlight various disputes related to
confidentiality and security while storing customer’s data on
untrusted cloud. At the current a days Sharing of data and
resource between the cloud users is a important problem.
There is a portion of search being made to find out the
disputes with these cloud service contractors and cloud
security in general. In this paper system recommends a secure
two fold method to share data for dynamic group in the cloud.
Biometrics transaction with computerized organizations of
identifying a person or verifying the identity of a person based
on physiological or interactive characteristics. Visual
cryptography is a top-secret sharing method where a secret
image is encrypted into the shares which independently reveal
no information about the original secret image. As biometric
pattern are deposited in the central database, due to security
threats biometric Pattern may be revised by attacker. If
biometric pattern is reformed authorized user will not be
allowed to access the resource. To contract this issue visual
cryptography schemes can be applied to secure the iris
Pattern. Visual cryptography offers excessive means for
helping such security needs as well as further layer of
authentication. By providing group signature , encryption
techniques and two fold methods, any cloud user can securely
share data with others. This technique rights required
consistency, security, scalability and most importantly
proficiency.

Full Text:

PDF

References


Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan. 2013, Mona:

Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE

Transactions On Parallel And Distributed Systems, Vol. 24, No. 6.

Sunita patil & Prof. Sandip Kadam, “RS-MONA: Reliable and Scalable

secure method to store and share secrete data for groups in cloud” , IJCA, ISBN

: 973-93-80883, 79-83.

Moni Naor and Adi Shamir, “Visual cryptography”, In Proceedings of the

advances in cryptology– Eurocrypt, , 1-12,1995.

Chander Kant, Ranjender Nath & Sheetal Chaudhary, “Biometrics security

using steganography”, , International Journal of Security, 2(1),1-5.

Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, “Protecting iris

images through asymmetric digital watermarking”, , 1-4244-1300-1, IEEE,

S., Ramesh Kumar R., Suresh R. and Harish S., “An overview of visual

cryptography”- Chandramathi International Journal of Computational

Intelligence Techniques, ISSN: 0976–0466 & E-ISSN: 0976–0474,Volume 1,

Issue 1, 2010, PP-32-37.

Anil k. jain, “Biometric Pattern Security-CHALLENGES AND

SOLUTIONS”-, Michigan State University, East lansing, MI, 48824,

USA,September 2005.

A. Rowstron and P. Druschel, "Pastry: Scalable, Distributed Object Location

and Routing for Large-Scale Peer-to-Peer Systems", IFIP/ACM International

Conference on Distributed Systems Platforms (Middleware), 2001.

Gopal Lakhani, “Optical Huffman coding of DCT Blocks”, IEEE

transactions on circuits and systems for video technology, VOL. 14,NO. 4,April

P.S. Revenkar, Anisa Anjum, W.Z.Gandhare, “Biometric Pattern Security”,

In EURASIP Journal on Advances in Signal Processing, Special Issue on

Biometrics, January 2008.

G. Sathish, Dr. S.V.Saravanan, Dr. S. Narmadha, “Multi-algorithmic IRIS

Recognition”, In International Journal of Computer Applications (0975 – 8887)

Volume 38– No.11, January 2012.

LakshmiMadhuri.K. Viraj Thakur Rajesh Jaiswal Sandesh Sonawane Rohit

Nalavade, “Biometric Data Security using Recursive Visual Cryptography”, In

Information and Knowledge Management ISSN 2224-5758 (Paper) ISSN 2224-

X ,Vol 2, No.2, 2012.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology