A Two Fold Approach to Store and Share Secrete Data for Groups in Cloud
Abstract
confidentiality and security while storing customer’s data on
untrusted cloud. At the current a days Sharing of data and
resource between the cloud users is a important problem.
There is a portion of search being made to find out the
disputes with these cloud service contractors and cloud
security in general. In this paper system recommends a secure
two fold method to share data for dynamic group in the cloud.
Biometrics transaction with computerized organizations of
identifying a person or verifying the identity of a person based
on physiological or interactive characteristics. Visual
cryptography is a top-secret sharing method where a secret
image is encrypted into the shares which independently reveal
no information about the original secret image. As biometric
pattern are deposited in the central database, due to security
threats biometric Pattern may be revised by attacker. If
biometric pattern is reformed authorized user will not be
allowed to access the resource. To contract this issue visual
cryptography schemes can be applied to secure the iris
Pattern. Visual cryptography offers excessive means for
helping such security needs as well as further layer of
authentication. By providing group signature , encryption
techniques and two fold methods, any cloud user can securely
share data with others. This technique rights required
consistency, security, scalability and most importantly
proficiency.
Full Text:
PDFReferences
Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan. 2013, Mona:
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE
Transactions On Parallel And Distributed Systems, Vol. 24, No. 6.
Sunita patil & Prof. Sandip Kadam, “RS-MONA: Reliable and Scalable
secure method to store and share secrete data for groups in cloud” , IJCA, ISBN
: 973-93-80883, 79-83.
Moni Naor and Adi Shamir, “Visual cryptography”, In Proceedings of the
advances in cryptology– Eurocrypt, , 1-12,1995.
Chander Kant, Ranjender Nath & Sheetal Chaudhary, “Biometrics security
using steganography”, , International Journal of Security, 2(1),1-5.
Nick Bartlow, Nathan Kalka, Bojan Cukic, and Arun Ross, “Protecting iris
images through asymmetric digital watermarking”, , 1-4244-1300-1, IEEE,
S., Ramesh Kumar R., Suresh R. and Harish S., “An overview of visual
cryptography”- Chandramathi International Journal of Computational
Intelligence Techniques, ISSN: 0976–0466 & E-ISSN: 0976–0474,Volume 1,
Issue 1, 2010, PP-32-37.
Anil k. jain, “Biometric Pattern Security-CHALLENGES AND
SOLUTIONS”-, Michigan State University, East lansing, MI, 48824,
USA,September 2005.
A. Rowstron and P. Druschel, "Pastry: Scalable, Distributed Object Location
and Routing for Large-Scale Peer-to-Peer Systems", IFIP/ACM International
Conference on Distributed Systems Platforms (Middleware), 2001.
Gopal Lakhani, “Optical Huffman coding of DCT Blocks”, IEEE
transactions on circuits and systems for video technology, VOL. 14,NO. 4,April
P.S. Revenkar, Anisa Anjum, W.Z.Gandhare, “Biometric Pattern Security”,
In EURASIP Journal on Advances in Signal Processing, Special Issue on
Biometrics, January 2008.
G. Sathish, Dr. S.V.Saravanan, Dr. S. Narmadha, “Multi-algorithmic IRIS
Recognition”, In International Journal of Computer Applications (0975 – 8887)
Volume 38– No.11, January 2012.
LakshmiMadhuri.K. Viraj Thakur Rajesh Jaiswal Sandesh Sonawane Rohit
Nalavade, “Biometric Data Security using Recursive Visual Cryptography”, In
Information and Knowledge Management ISSN 2224-5758 (Paper) ISSN 2224-
X ,Vol 2, No.2, 2012.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology