CFP last date
20 December 2024
Reseach Article

Finding Malicious One in Group Data Sharing

by G. Navya, G. Ravi, Prasanta Kumar Sahoo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 19
Year of Publication: 2020
Authors: G. Navya, G. Ravi, Prasanta Kumar Sahoo
10.5120/ijca2020920149

G. Navya, G. Ravi, Prasanta Kumar Sahoo . Finding Malicious One in Group Data Sharing. International Journal of Computer Applications. 176, 19 ( May 2020), 44-46. DOI=10.5120/ijca2020920149

@article{ 10.5120/ijca2020920149,
author = { G. Navya, G. Ravi, Prasanta Kumar Sahoo },
title = { Finding Malicious One in Group Data Sharing },
journal = { International Journal of Computer Applications },
issue_date = { May 2020 },
volume = { 176 },
number = { 19 },
month = { May },
year = { 2020 },
issn = { 0975-8887 },
pages = { 44-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number19/31311-2020920149/ },
doi = { 10.5120/ijca2020920149 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:42:59.688705+05:30
%A G. Navya
%A G. Ravi
%A Prasanta Kumar Sahoo
%T Finding Malicious One in Group Data Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 19
%P 44-46
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of the fastest developing in the internet, it provides user demanding resources and services with low cost. Users can easily use cloud resource to do their works without any interruptions like doing personal works, social networks, video editing and business works like many more. Group data sharing grabbed people attention to share their works and thoughts in cloud computing. In this concept multiple users can access same data or documents to do works for developed of projects. With this concept users get lots of benefits because they can do work any where as they like with their resources because they don’t need to buy new hardware or software to their works. Whenever group of people working on some important work then owner can’t find malicious user in it. Its big challenge in cloud computing. Group members can share information anonymously without revealing their identity but this became big challenge in computing because when user used fake id’s then it will be threat to document because they might misuse it. Dynamic changes of the group member, exploiting the key understanding and efficient get to control, the computational multifaceted nature and correspondence intricacy for refreshing the normal meeting key and the encryption information are generally low and its time taking process to share data in groups and consume high memory. Proposing user defined encryption for data sharing to secure communication. It can share the data to users in secure way and efficiently and tracing malicious user in group data sharing. It requires low amount to memory and low time to process encryption.

References
  1. “Block Design-based Key Agreement for Group Data Sharing in Cloud Computing” 1545-5971 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requiresIEEEpermission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
  2. “Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation” This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TC.2015.2389955, IEEE Transactions on Computers
  3. “A Method for Obtaining Digital Signatures and Public- Key Cryptosystems “Communications February 1978 of Volume 21 the ACM Number 2 , © 1978 ACM 0001-0782178/0200-0120 $00.75 .
  4. “An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 12, NO. 10, OCTOBER 2017
  5. “A Projection-based Hotspot Analysis Method “2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC) Dec 20-22, 2013, Shenyang, China.
  6. “Reduction of Malicious Behavior Patterns Based on Attribute Order” 978-1-4244-6585-9/10/$26.00©2010 IEEE
  7. “Malicious Node Detection On Vehicular Ad-Hoc Network Using Dempster Shafer Theory For Denial Of Services Attack “2016 8th International Conference on Computational Intelligence and Communication Networks, 978-1-5090-1144-5/16 $31.00 © 2016 IEEE DOI 10.1109/CICN.2016.91.
  8. “Unknown Malicious Executables Detection Based on Run-time Behavior “Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 978-0-7695-3305-6/08 $25.00 © 2008 IEEE DOI 10.1109/FSKD.2008.185 .
  9. “Systematic Scanning for Malicious Source Code” 978-1-4244- 1978-4/08/$25.00 02008 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Group Data Sharing AES(Advanced Encryption Standard ) SBIBD(Symmetric Balanced Incomplete Block Design)