A KEY BASED DATA SHARING PROTOCOL FOR SECURE INTER GROUP TRANSFERS

K. Balaji, K Nukaraju

Abstract


Storing data on remote cloud storage makes the maintenance affordable by data owners. The reliability and trustworthiness of these remote storage locations is the main concern for data owners and cloud service providers. When multiple data owners are involved, the aspects of membership and data sharing need to be addressed. In this paper the authors proposed efficient multi owner data sharing technique over cloud storage. The proposed scheme provides privacy and complexity while handling the data sharing over cloud. The proposed technique works with improved Shamir’s secret sharing group key mechanism. In this technique data can be uploaded in to the server after the encryption of the content by the secret group key. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners.


Keywords


Data Sharing; Cloud Computing; Access Control; User Revocation;

References


Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, Ieee transactions on parallel and distributed systems, vol. 24, no. 6, june 2013

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing,”Proc. IEEE INFOCOM, pp. 534-542, 2010.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc.USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.

Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Proc. CRYPTO. pp. 41–55. Springer-Verlag (2004)

Boneh, D., Freeman, D.M.: Homomorphic Signatures for Polynomial Functions. In: Proc. EUROCRYPT. pp. 149–168. Springer-Verlag (2011)

Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Proc. EUROCRYPT. pp. 416–432. SpringerVerlag (2003)

Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Proc. ASIACRYPT. pp.514–532. Springer-Verlag (2001)

Chaum, D., van Heyst, E.: Group Signatures. In: Proc.EUROCRYPT.pp.257–265.Springer-Verlag (1991).


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.