We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud

by Sunita R. Patil, Sandeep Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 3
Year of Publication: 2014
Authors: Sunita R. Patil, Sandeep Kadam
10.5120/17794-8595

Sunita R. Patil, Sandeep Kadam . RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud. International Journal of Computer Applications. 102, 3 ( September 2014), 13-17. DOI=10.5120/17794-8595

@article{ 10.5120/17794-8595,
author = { Sunita R. Patil, Sandeep Kadam },
title = { RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 3 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number3/17794-8595/ },
doi = { 10.5120/17794-8595 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:08.817703+05:30
%A Sunita R. Patil
%A Sandeep Kadam
%T RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 3
%P 13-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents various issues related to privacy and security while storing user's data on untrusted cloud. In today's world Sharing of group resource among the cloud users is a major problem. There is a lot of research being made to find out the issues with these cloud service providers and cloud security in general. In this paper system proposes a secure multi-owner data sharing scheme, for dynamic group in the cloud. By providing group signature and encryption techniques, any cloud user can securely share data with others. The main objective of this paper include: to provide security for dynamic group system integrates Image based authentication and one time password (OTP) to achieve high level of security. In addition system identified some limitations in the same approach in terms of reliability and scalability . To resolve the drawbacksystem extends the basic MONA by adding the reliability as well as improving the scalability by growing the backup group managers dynamically. In this method System further presenting how system manage the risks like failure of group manager by increasing the number of backup group manager, sagging of group manager in case number of requests more . This method claims required reliability ,security,scalability and most importantly efficiency.

References
  1. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan. 2013, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 6.
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, 2010, A View of Cloud Computing, Comm. ACM, vol. 53, no. 4, pp. 50-58.
  3. S. Kamara and K. Lauter, 2010, Cryptographic Cloud Storage, Proc. Int'l Conf. Financial Cryptography and data Security (FC), pp. 136- 149. S. Yu, C. Wang, K. Ren,and W. Lou,2010 ,Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, Proc. IEEE INFOCOM, pp. 534-542.
  4. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, 2003,Sirius: Securing Remote Untrusted Storage, Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145.
  5. R. Lu, X. Lin, X. Liang, and X. Shen, 2010, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292.
  6. B. Waters, 2008 ,Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Proc. Int'l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint. iacr. org/2008/290.
  7. V. Goyal,O. Pandey, A. Sahai, and B. Waters,2006 ,Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98.
  8. Fiat and M. Naor 1993, Broadcast Encryption, Proc. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491.
  9. Wang, B. Li, and H. Li, 2012, Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud, Proc. 10th Int'l Conf. Applied Cryptography and Network Security, pp. 507-525.
  10. Pointcheval and J. Stern, 2000, Security Arguments for Digital Signatures and Blind Signatures. Cryptology, vol. 13, no. 3, pp. 361-396.
  11. V. Sathana, J. Shanthini, 2013 Three level security system for dynamics group in cloud (IJCST)- Volume1 Issue2.
  12. Mrs. Sunita R. Patil, Prof Sandeep Kadam 2014, Reliable and Scalable approach to Store and Share Sensitive Data for Dynamic Groups in the Cloud, International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE), Volume 4, Issue 5,ISSN: 2277
  13. D. Naor, M. Naor, and J. B. Lotspiech, 2001, Revocation and TracingSchemes for Stateless Receivers, Proc. Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-62.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing reliability integrity one time password authentication