CFP last date
20 January 2025
Reseach Article

Re-Encryption Scheme of Secure Data Sharing for Dynamic Groups in the Cloud

by Ajit N. Pawar, Sonal Fatangare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 7
Year of Publication: 2017
Authors: Ajit N. Pawar, Sonal Fatangare
10.5120/ijca2017914913

Ajit N. Pawar, Sonal Fatangare . Re-Encryption Scheme of Secure Data Sharing for Dynamic Groups in the Cloud. International Journal of Computer Applications. 170, 7 ( Jul 2017), 12-15. DOI=10.5120/ijca2017914913

@article{ 10.5120/ijca2017914913,
author = { Ajit N. Pawar, Sonal Fatangare },
title = { Re-Encryption Scheme of Secure Data Sharing for Dynamic Groups in the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 7 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number7/28082-2017914913/ },
doi = { 10.5120/ijca2017914913 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:51.550449+05:30
%A Ajit N. Pawar
%A Sonal Fatangare
%T Re-Encryption Scheme of Secure Data Sharing for Dynamic Groups in the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 7
%P 12-15
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Continuous changes in the membership of data sharing giving security and privacy preservation are still challenging issues, especially for an untruth cloud due to the collusion attack. It is based on the secure key distribution without assuming any secure communication channel. We propose a secure re encryption scheme of data sharing scheme without assuming secure communication channel for dynamic groups in the cloud .The system provides fine grained access control for any clients who wants to access the information from cloud .It also prevents access of clients after their revocation and protect from collusion attack. Proposed system provide guarantee for secure sharing of data files when they are outsourced with double encryption and particular security key distribution mechanism. Re-encryption of message provides the data security and prevents other security attacks like man in middle attack. If an attacker tries to decrypt the massage using untruth cloud ,it will not possible for them. Users can achieve an effective and economical way for data sharing among group members in the cloud with efficient manner and little management cost.

References
  1. D. Dolev and A. C. Yao, “On the security of public key protocols,”IEEE Trans. Inf. Theory, vol. IT-29, no. 2, pp. 198208, Mar. 1983.
  2. X. Zou, Y.-S. Dai, and E. Bertino, “A practical and flexible key management mechanism for trusted collaborative computing,”in Proc. IEEE Conf. Comput. Commun., 2008, pp. 12111219.
  3. L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving secure role-based access control on encrypted data in cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 19471960, Dec. 2013.
  4. M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policy based content sharing in public clouds,” IEEE Trans. Know. Data Eng., vol. 25, no. 11, pp. 26022614, Nov. 2013.
  5. X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure multiowner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 11821191, Jun. 2013.
  6. Z. Zhu, Z. Jiang, and R. Jiang, The attack on “mona: Secure multiowner data sharing for dynamic groups in the cloud,” in Proc. Int.Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185189.
  7. Burhan Ul Islam Khan, Rashidah F. Olanrewaju “SSM: Secure-Split-Merge Data Distribution in Cloud Infrastructure,” in 2015 IEEE Conference on Open Systems (ICOS), August 24-26, 2015, Melaka, Malaysia
  8. Jie Xu, Qiaoyan Wen, Wenmin Li, and Zhengping Jin, “Circuit Ciphertext- Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 1, JANUARY 2016.
  9. Joseph K. Liu, Member, IEEE, Man Ho Au, Member, IEEE, Xinyi Huang, Rongxing Lu, Senior Member, IEEE, and Jin Li, Fine-Grained “Two-Factor Access Control for Web-Based Cloud Computing Services,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,VOL. 11, NO. 3, MARCH 2016.
  10. Nazatul Haque Sultan Ferdous Ahmed Barbhuiya, “A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment,” 978-1-5090-2616-6/16 2016 IEEE DOI 10.1109/SERVICES.2016.16.
  11. Zhongma Zhu and Rui Jiang “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 1, JANUARY 2016
Index Terms

Computer Science
Information Sciences

Keywords

Key Distribution Re-Encryption Access Control Collusion Attack Fine-Grain Access User Revocation Group Membership.