Enabling Secure Data Sharing Scheme in Cloud Storage Group by Verify Using Third Party Authentication

Authors

  • M. Jenifa PG Scholar, Department of Computer Science and Engineering, Anna University, BIT-Campus, Tiruchirappalli, India
  • K. Ambika Assistant Professor, Department of Computer Science and Engineering, Anna University, BIT-Campus, Tiruchirappalli, India

Keywords:

Secure Data Sharing, Role with Time based access control, AES encryption, Group member revocation, Key Updation, Data Auditing, TPA Verification

Abstract

Cloud computing provides high performance, accessibility, and low cost for data storing, and sharing provides a better consumption of resources. In cloud computing, cloud service providers compromise an abstraction of infinite storage space for clients to mass data. It can help clients diminish their financial overhead of data management by drifting the local management system into cloud servers. However, security concerns develop the main constraint as we now outsource the storage of data, which is possibly sensitive, to cloud providers. To preserve data privacy, a mutual approach is to encrypt data files before the clients upload the encrypted data into the cloud. Cloud storage services can help clients reduce their monetary and maintenance overhead of data management. Data confidentiality becomes the main concern in outsourcing client data to cloud storage. It is also essential for an access control mechanism for preventing data mistreatment within the organization. Unfortunately, it is hard to design cozy and green facts sharing scheme, particularly for dynamic groups within the cloud. To overcome the problem, here propose a secure data sharing scheme for frequently changed groups. In this work, an AES based encryption scheme is proposed which incorporates the cryptographic approaches with Group Data Sharing and also an anonymous control scheme to address the privacy in data as well as the user identity privacy in current access control schemes. If the group member can be revoked means, automatically change public keys of the existing group and no need to encrypt again the original data. Any member in the group can use the source within the cloud and revoked members can't access the cloud once more after they are revoked. Finally, implement this secure distribution scheme into group data sharing environments. To reduce the computation burden on the member side, a Third Party Auditor (TPA) is introduced to verify the integrity of the cloud data on behalf of the member. When the manager sends a request for file auditing, TPA will check the file integrity using the TPA verification key and send results to the manager.

Downloads

Download data is not yet available.

Downloads

Published

13-07-2020

Issue

Section

Articles

How to Cite

[1]
M. Jenifa and K. Ambika, “Enabling Secure Data Sharing Scheme in Cloud Storage Group by Verify Using Third Party Authentication”, IJRESM, vol. 3, no. 7, pp. 29–35, Jul. 2020, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/13