SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 38|
Secure File Sharing In Cloud Using Encryption with Digital
Signature
Miss. N. Kanchana1
, Mr. S. Balamurugan2
1, 2
(PG Student, Assistant Professor, Sri Manakula Vinayagar Engineering College, Pondicherry-605106)
I. Introduction
Cloud computing is a type of computing that relies on sharing computing resources rather than having
local servers or personal devices to handle applications. It comes into focus only when you think about what IT
always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure,
training new personnel, or licensing new software. "the cloud" is essentially a metaphor for the Internet.
Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure
that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming
servers which host products and services from a remote location, so end-users don't have to; they can simply log
on to the network without installing anything. Cloud computing providers offer their services according to
several fundamental models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a
service (SaaS).
(A) Software as a Service
Delivery of software applications over the internet. The software is frequently delivered using a one-to-
may approach and is not customized. Hence on the supply-side, the provider is managing one application from
one or more dedicated locations, whilst on the demand-side; customers are not required to make any hardware
(such as servers) or software investments. For example: Gmail, hotmail, yahoo.
(B) Platform as a service
Delivery of a computing platform for the development of services and applications from a cloud. This
category of service tends to be not as mainstream as the other "-aaS" options. Since it is used almost exclusively
by programmers. For example: Google App Engine, Amazon EC2,Microsoft Azure Platform.
(C) Infrastructure as a Service
Delivery and remote management of computer and networking hardware, as well as processing power,
as a service over the internet. Customers can purchase storage, processing power, networking capability etc, as
and when needed, and commensurate with their actual needs. For Example: Storage-Dropbox, icloud, Adrive,
mozy, amazon web service. Web hosting- Go daddy, bluehost, fatcow. Virtual Servers-IBM, Rimu Hosting.
II. Advanced Encryption Standard (AES)
AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting
the data.
Block length: 128 bits (P = C = {0,1}1 2 8 )
Key lengths: 128, 192, 256 bits (K = {0,1}1 2 8 , ...)
The key size used for an AES cipher specifies the number of repetitions of transformation rounds that
convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of
repetition are as follows:
• 10 cycles of repetition for 128-bit keys.
• 12 cycles of repetition for 192-bit keys.
• 14 cycles of repetition for 256-bit keys.
Abstract: This paper we discuss about the data sharing in a cloud with multiple owner by generating
keys and digital signature. The proposed methodology suggests the encryption of the files to be uploaded
on the cloud. To ensure the security of data, we proposed a method by implementing AES algorithm. The
integrity and confidentiality of the data is achieved by not only encrypting it but also providing Digital
Signature for successful authentication. It provides two way security for data sharing.
Keywords: Cloud, Encryption, Integrity, Confidentiality, Digital Signature.
Secure File Sharing In Cloud Using Encryption With Digital Signature
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 39|
(i) KeyExpansion: round keys are derived from the cipher key using Rijndael's key schedule. AES requires a
separate 128-bit round key block for each round plus one more.
(ii) InitialRound:
AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor.
(iii) Rounds:
1.SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table.
2.ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number
of steps.
3.MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in
each column.
4.AddRoundKey
(iv) Final Round (no Mix Columns):
1.SubBytes
2.ShiftRows
3.AddRoundKey.
III. Key Generation
If owner needs to send a file to the user then the unique key will be generated for each user by the
owner. Suppose owner would like to send the same file to the different users then the owner can just share the
unique key to different users and the owner need not to send the same file again and again. So it eliminates the
redundancy in database. If user deletes the file then it won't affect the other users to access that file its because
only the key will be deleted not the file. In case if we don't use the key management then it definitely affects the
other users to access the files.
IV. Digital Signature
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or
document. Digital signatures are commonly used for software distribution, financial transactions, and in other
cases where it is important to detect forgery or tampering. It is basically a way to ensure that an electronic
Secure File Sharing In Cloud Using Encryption With Digital Signature
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 40|
document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the
document and you know that it has not been altered in any way since that person created it.
Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process
of taking all the data that one computer is sending to another and encoding it into a form that only the other
computer will be able to decode. Authentication is the process of verifying that information is coming from a
trusted source. Once file is uploaded based on the owner name, user name, key, file name, file type then the
digital signature will be created and it is send to the user.
V. File Upload
Steps involved in file upload process are explained below:
Step 1: Accept owner id and password from the owner.
• If owner is authorized,
then allow to connect with the cloud
• Else,
show authentication error and don’t allow
Step 2: Ask owner to select a file to be uploaded onto the cloud
Step 3: Ask the owner to select a user
Step 4: Ask the owner to enter a unique key for user
Step 5: Apply the encryption algorithm
Step 6: Upload the file on to the cloud
Step 7: The user gets the key through SMS and the Digital Signature file will be generated automatically by the
system and it is send to the user through Email once the file is uploaded.
Step 8: Disconnect from the cloud.
VI. File Download
Steps involved in file download process are explained below:
Step 1: Accept user id and password from the user
• If user is authorized,
then allow to connect with the cloud
• Else,
show authentication error and don't allow
Step 2: Ask user to select a file to be download which is sent by the owner
Step 3: Ask the user to enter a key which is received through SMS
Step 4: Ask the user to download the Digital Signature file from Email
Step 5: Ask the user to upload the Digital Signature file
Step 6: Check the validity
• If the key and the digital signature is matched,
then Apply the decryption algorithm for download the file from the cloud
• Else,
show an error message and reject the download process
Step 7: Disconnect from the cloud
Secure File Sharing In Cloud Using Encryption With Digital Signature
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 41|
VII. Conclusion
In this paper we mainly focused on data confidentiality and integrity so we used an encryption
algorithm and we also designed a digital signature scheme to invoke high secured data transaction in the cloud.
It also eliminates the redundancy it’s because of key management. Here, anyone could be a owner if they are
registered in the cloud. The user of a particular organization can be able to access the particular information
which is available in the file. It is more reliable to the cloud for better security.
REFERENCES
[1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data
Security (FC), pp. 136-149, Jan. 2010.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable and Fine-Grained Data Access Control in Cloud
Computing,” Proc. IEEE INFOCOM,pp. 534-542,2010
[3] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian and Aoying Zhou, “Security and Privacy in Cloud Computing: A
Survey”, In Sixth International Conference on Semantics, Knowledge and Grids, 2010.
[4] Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, In 6th International Conference on
Internet Technology and Secured Transactions, 2011.
[5] Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, “Cloud Security Issues”, In IEEE
International Conference on Services Computing, 2009.
[6] D. Boneh, X. Boyen, and H. Shacham, “Short Group Signature,” Proc. Int’l Cryptology Conf. Advances in
Cryptology (CRYPTO),pp. 41-55, 2004.
[7] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf.
Advances in Cryptology (CRYPTO), pp. 213-229, 2001.
[8] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu “Plutus: Scalable Secure File Sharing on Untrusted
Storage,” Pro USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[9] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” J. Cryptology, vol.
13, no. 3, pp. 361-396, 2000.

Weitere ähnliche Inhalte

Was ist angesagt?

Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationIRJET Journal
 

Was ist angesagt? (16)

Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
J018145862
J018145862J018145862
J018145862
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
 

Andere mochten auch

Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...IJMER
 
Bt32884887
Bt32884887Bt32884887
Bt32884887IJMER
 
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA Welds
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA WeldsEffect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA Welds
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA WeldsIJMER
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingIJMER
 
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsNonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsIJMER
 
High End Solution for Advanced Civil Engineering Projects
High End Solution for Advanced Civil Engineering ProjectsHigh End Solution for Advanced Civil Engineering Projects
High End Solution for Advanced Civil Engineering ProjectsIJMER
 
Investigate the Route of Chaos Induced Instabilities in Power System Network
Investigate the Route of Chaos Induced Instabilities in Power  System NetworkInvestigate the Route of Chaos Induced Instabilities in Power  System Network
Investigate the Route of Chaos Induced Instabilities in Power System NetworkIJMER
 
I0502 01 4856
I0502 01 4856I0502 01 4856
I0502 01 4856IJMER
 
Aa02417361740
Aa02417361740Aa02417361740
Aa02417361740IJMER
 
E04012533
E04012533E04012533
E04012533IJMER
 
Periperal sistem operasi fitri tkj a no 12
Periperal sistem operasi fitri tkj a no 12Periperal sistem operasi fitri tkj a no 12
Periperal sistem operasi fitri tkj a no 12fitri febriani
 
Acc 422 final exam
Acc 422 final examAcc 422 final exam
Acc 422 final examliam111221
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryIJMER
 
H04011 04 5361
H04011 04 5361H04011 04 5361
H04011 04 5361IJMER
 
Query Answering Approach Based on Document Summarization
Query Answering Approach Based on Document SummarizationQuery Answering Approach Based on Document Summarization
Query Answering Approach Based on Document SummarizationIJMER
 
презентация август 2012
презентация август 2012презентация август 2012
презентация август 2012afedorchuk
 
презентация август 2012
презентация август 2012презентация август 2012
презентация август 2012afedorchuk
 

Andere mochten auch (20)

Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...Bit Error Rate Analysis in WiMAX Communication at Vehicular  Speeds using mod...
Bit Error Rate Analysis in WiMAX Communication at Vehicular Speeds using mod...
 
Bt32884887
Bt32884887Bt32884887
Bt32884887
 
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA Welds
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA WeldsEffect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA Welds
Effect of Modified AA5356 Filler on Corrosion Behavior of AA6061 Alloy GTA Welds
 
Swuni2012 cyberdoc
Swuni2012 cyberdocSwuni2012 cyberdoc
Swuni2012 cyberdoc
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid Tooling
 
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsNonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
 
High End Solution for Advanced Civil Engineering Projects
High End Solution for Advanced Civil Engineering ProjectsHigh End Solution for Advanced Civil Engineering Projects
High End Solution for Advanced Civil Engineering Projects
 
Investigate the Route of Chaos Induced Instabilities in Power System Network
Investigate the Route of Chaos Induced Instabilities in Power  System NetworkInvestigate the Route of Chaos Induced Instabilities in Power  System Network
Investigate the Route of Chaos Induced Instabilities in Power System Network
 
I0502 01 4856
I0502 01 4856I0502 01 4856
I0502 01 4856
 
Aa02417361740
Aa02417361740Aa02417361740
Aa02417361740
 
E04012533
E04012533E04012533
E04012533
 
Periperal sistem operasi fitri tkj a no 12
Periperal sistem operasi fitri tkj a no 12Periperal sistem operasi fitri tkj a no 12
Periperal sistem operasi fitri tkj a no 12
 
Acc 422 final exam
Acc 422 final examAcc 422 final exam
Acc 422 final exam
 
London
LondonLondon
London
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industry
 
H04011 04 5361
H04011 04 5361H04011 04 5361
H04011 04 5361
 
móbils amb internet
móbils amb internetmóbils amb internet
móbils amb internet
 
Query Answering Approach Based on Document Summarization
Query Answering Approach Based on Document SummarizationQuery Answering Approach Based on Document Summarization
Query Answering Approach Based on Document Summarization
 
презентация август 2012
презентация август 2012презентация август 2012
презентация август 2012
 
презентация август 2012
презентация август 2012презентация август 2012
презентация август 2012
 

Ähnlich wie Secure File Sharing In Cloud Using Encryption with Digital Signature

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityPratik Sharma
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 

Ähnlich wie Secure File Sharing In Cloud Using Encryption with Digital Signature (20)

Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
F017414853
F017414853F017414853
F017414853
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
21 muhammad ahmadjan_8
21 muhammad ahmadjan_821 muhammad ahmadjan_8
21 muhammad ahmadjan_8
 

Mehr von IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Mehr von IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Kürzlich hochgeladen

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 

Kürzlich hochgeladen (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 

Secure File Sharing In Cloud Using Encryption with Digital Signature

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 38| Secure File Sharing In Cloud Using Encryption with Digital Signature Miss. N. Kanchana1 , Mr. S. Balamurugan2 1, 2 (PG Student, Assistant Professor, Sri Manakula Vinayagar Engineering College, Pondicherry-605106) I. Introduction Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. It comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. Cloud computing providers offer their services according to several fundamental models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). (A) Software as a Service Delivery of software applications over the internet. The software is frequently delivered using a one-to- may approach and is not customized. Hence on the supply-side, the provider is managing one application from one or more dedicated locations, whilst on the demand-side; customers are not required to make any hardware (such as servers) or software investments. For example: Gmail, hotmail, yahoo. (B) Platform as a service Delivery of a computing platform for the development of services and applications from a cloud. This category of service tends to be not as mainstream as the other "-aaS" options. Since it is used almost exclusively by programmers. For example: Google App Engine, Amazon EC2,Microsoft Azure Platform. (C) Infrastructure as a Service Delivery and remote management of computer and networking hardware, as well as processing power, as a service over the internet. Customers can purchase storage, processing power, networking capability etc, as and when needed, and commensurate with their actual needs. For Example: Storage-Dropbox, icloud, Adrive, mozy, amazon web service. Web hosting- Go daddy, bluehost, fatcow. Virtual Servers-IBM, Rimu Hosting. II. Advanced Encryption Standard (AES) AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. Block length: 128 bits (P = C = {0,1}1 2 8 ) Key lengths: 128, 192, 256 bits (K = {0,1}1 2 8 , ...) The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of repetition are as follows: • 10 cycles of repetition for 128-bit keys. • 12 cycles of repetition for 192-bit keys. • 14 cycles of repetition for 256-bit keys. Abstract: This paper we discuss about the data sharing in a cloud with multiple owner by generating keys and digital signature. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. To ensure the security of data, we proposed a method by implementing AES algorithm. The integrity and confidentiality of the data is achieved by not only encrypting it but also providing Digital Signature for successful authentication. It provides two way security for data sharing. Keywords: Cloud, Encryption, Integrity, Confidentiality, Digital Signature.
  • 2. Secure File Sharing In Cloud Using Encryption With Digital Signature | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 39| (i) KeyExpansion: round keys are derived from the cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more. (ii) InitialRound: AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor. (iii) Rounds: 1.SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2.ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. 3.MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. 4.AddRoundKey (iv) Final Round (no Mix Columns): 1.SubBytes 2.ShiftRows 3.AddRoundKey. III. Key Generation If owner needs to send a file to the user then the unique key will be generated for each user by the owner. Suppose owner would like to send the same file to the different users then the owner can just share the unique key to different users and the owner need not to send the same file again and again. So it eliminates the redundancy in database. If user deletes the file then it won't affect the other users to access that file its because only the key will be deleted not the file. In case if we don't use the key management then it definitely affects the other users to access the files. IV. Digital Signature A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. It is basically a way to ensure that an electronic
  • 3. Secure File Sharing In Cloud Using Encryption With Digital Signature | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 40| document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Authentication is the process of verifying that information is coming from a trusted source. Once file is uploaded based on the owner name, user name, key, file name, file type then the digital signature will be created and it is send to the user. V. File Upload Steps involved in file upload process are explained below: Step 1: Accept owner id and password from the owner. • If owner is authorized, then allow to connect with the cloud • Else, show authentication error and don’t allow Step 2: Ask owner to select a file to be uploaded onto the cloud Step 3: Ask the owner to select a user Step 4: Ask the owner to enter a unique key for user Step 5: Apply the encryption algorithm Step 6: Upload the file on to the cloud Step 7: The user gets the key through SMS and the Digital Signature file will be generated automatically by the system and it is send to the user through Email once the file is uploaded. Step 8: Disconnect from the cloud. VI. File Download Steps involved in file download process are explained below: Step 1: Accept user id and password from the user • If user is authorized, then allow to connect with the cloud • Else, show authentication error and don't allow Step 2: Ask user to select a file to be download which is sent by the owner Step 3: Ask the user to enter a key which is received through SMS Step 4: Ask the user to download the Digital Signature file from Email Step 5: Ask the user to upload the Digital Signature file Step 6: Check the validity • If the key and the digital signature is matched, then Apply the decryption algorithm for download the file from the cloud • Else, show an error message and reject the download process Step 7: Disconnect from the cloud
  • 4. Secure File Sharing In Cloud Using Encryption With Digital Signature | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 41| VII. Conclusion In this paper we mainly focused on data confidentiality and integrity so we used an encryption algorithm and we also designed a digital signature scheme to invoke high secured data transaction in the cloud. It also eliminates the redundancy it’s because of key management. Here, anyone could be a owner if they are registered in the cloud. The user of a particular organization can be able to access the particular information which is available in the file. It is more reliable to the cloud for better security. REFERENCES [1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010. [2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM,pp. 534-542,2010 [3] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian and Aoying Zhou, “Security and Privacy in Cloud Computing: A Survey”, In Sixth International Conference on Semantics, Knowledge and Grids, 2010. [4] Farhan Bashir Shaikh and Sajjad Haider, “Security Threats in Cloud Computing”, In 6th International Conference on Internet Technology and Secured Transactions, 2011. [5] Balachandra Reddy Kandukuri, Ramakrishna Paturi V and Dr. Atanu Rakshit, “Cloud Security Issues”, In IEEE International Conference on Services Computing, 2009. [6] D. Boneh, X. Boyen, and H. Shacham, “Short Group Signature,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO),pp. 41-55, 2004. [7] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001. [8] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Pro USENIX Conf. File and Storage Technologies, pp. 29-42, 2003. [9] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” J. Cryptology, vol. 13, no. 3, pp. 361-396, 2000.