SlideShare a Scribd company logo
Suche senden
Hochladen
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Melden
Teilen
IRJET Journal
Fast Track Publications
Folgen
•
0 gefällt mir
•
25 views
Ingenieurwesen
https://www.irjet.net/archives/V6/i3/IRJET-V6I3535.pdf
Mehr lesen
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
•
0 gefällt mir
•
25 views
IRJET Journal
Fast Track Publications
Folgen
Melden
Teilen
Ingenieurwesen
https://www.irjet.net/archives/V6/i3/IRJET-V6I3535.pdf
Mehr lesen
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
1 von 3
Jetzt herunterladen
Recomendados
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN... von
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
67 views
•
15 Folien
Attribute-Based Data Sharing von
Attribute-Based Data Sharing
IJERA Editor
352 views
•
4 Folien
IRJET- Securing Cloud Data Under Key Exposure von
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
203 views
•
5 Folien
Secure Data Sharing In an Untrusted Cloud von
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
294 views
•
6 Folien
Towards Achieving Efficient and Secure Way to Share the Data von
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
26 views
•
4 Folien
IRJET-Using Downtoken Secure Group Data Sharing on Cloud von
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
22 views
•
3 Folien
Más contenido relacionado
Was ist angesagt?
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud von
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
18 views
•
4 Folien
A robust and verifiable threshold multi authority access control system in pu... von
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
33 views
•
4 Folien
The Recent Trend: Vigorous unidentified validation access control system with... von
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
36 views
•
5 Folien
IRJET- Adaptable Wildcard Searchable Encryption System von
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
11 views
•
4 Folien
Oruta project report von
Oruta project report
Manasa Chowdary
4.7K views
•
47 Folien
Achieving Secure, sclable and finegrained Cloud computing report von
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
489 views
•
34 Folien
Was ist angesagt?
(18)
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud von IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
•
18 views
A robust and verifiable threshold multi authority access control system in pu... von IJARIIT
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
•
33 views
The Recent Trend: Vigorous unidentified validation access control system with... von IJERA Editor
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
•
36 views
IRJET- Adaptable Wildcard Searchable Encryption System von IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
•
11 views
Oruta project report von Manasa Chowdary
Oruta project report
Manasa Chowdary
•
4.7K views
Achieving Secure, sclable and finegrained Cloud computing report von Kiran Girase
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
•
489 views
Volume 2-issue-6-2073-2076 von Editor IJARCET
Volume 2-issue-6-2073-2076
Editor IJARCET
•
191 views
A Novel Information Accountability Framework for Cloud Computing von IJMER
A Novel Information Accountability Framework for Cloud Computing
IJMER
•
289 views
H1803035056 von IOSR Journals
H1803035056
IOSR Journals
•
149 views
Secure Data Sharing in Cloud (SDSC) von Jishnu Pradeep
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
•
3.1K views
IJSRED-V2I3P52 von IJSRED
IJSRED-V2I3P52
IJSRED
•
14 views
Iaetsd secure data sharing of multi-owner groups in cloud von Iaetsd Iaetsd
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd Iaetsd
•
395 views
IRJET- Redsc: Reliablity of Data Sharing in Cloud von IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
•
38 views
Iaetsd an efficient secure scheme for multi user in cloud von Iaetsd Iaetsd
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd Iaetsd
•
185 views
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ... von IRJET Journal
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
•
35 views
Providing Secure Cloud for College Campus von vivatechijri
Providing Secure Cloud for College Campus
vivatechijri
•
16 views
Encryption based multi user manner secured data sharing and storing in cloud von prjpublications
Encryption based multi user manner secured data sharing and storing in cloud
prjpublications
•
637 views
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing von IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
•
59 views
Similar a IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... von
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
130 views
•
4 Folien
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. von
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
423 views
•
6 Folien
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics von
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
17 views
•
3 Folien
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr... von
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
62 views
•
5 Folien
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems von
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
10 views
•
4 Folien
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... von
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
29 views
•
4 Folien
Similar a IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
(20)
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co... von IRJET Journal
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
•
130 views
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. von IJCERT JOURNAL
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
•
423 views
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics von IRJET Journal
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
•
17 views
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr... von IRJET Journal
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
•
62 views
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems von IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
•
10 views
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... von IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 views
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing von IRJET Journal
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
•
18 views
IRJET - Virtual Data Auditing at Overcast Environment von IRJET Journal
IRJET - Virtual Data Auditing at Overcast Environment
IRJET Journal
•
13 views
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat... von IRJET Journal
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
•
22 views
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing von IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
•
19 views
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A... von IRJET Journal
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
•
22 views
Dynamic Resource Allocation and Data Security for Cloud von AM Publications
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
•
272 views
An Approach towards Shuffling of Data to Avoid Tampering in Cloud von IRJET Journal
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
•
34 views
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity... von IRJET Journal
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
•
5 views
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud von IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
•
64 views
Efficient and Empiric Keyword Search Using Cloud von IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
•
0 views
System Approach for Single Keyword Search for Encrypted Data Files Guarantees... von IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
•
34 views
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage von IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
•
22 views
IRJET- Secure Cloud Data Using Attribute Based Encryption von IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
•
20 views
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA von IRJET Journal
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
•
4 views
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 views
•
7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 views
•
7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 views
•
5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 views
•
11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 views
•
6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 views
•
5 Folien
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
44 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 views
Último
Design and analysis of a new undergraduate Computer Engineering degree – a me... von
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy6
56 views
•
4 Folien
SNMPx von
SNMPx
Amatullahbutt
15 views
•
12 Folien
K8S Roadmap.pdf von
K8S Roadmap.pdf
MaryamTavakkoli2
6 views
•
1 Folie
NEW SUPPLIERS SUPPLIES (copie).pdf von
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou
14 views
•
30 Folien
Object Oriented Programming with JAVA von
Object Oriented Programming with JAVA
Demian Antony D'Mello
107 views
•
28 Folien
Electrical Crimping von
Electrical Crimping
Iwiss Tools Co.,Ltd
25 views
•
22 Folien
Último
(20)
Design and analysis of a new undergraduate Computer Engineering degree – a me... von WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy6
•
56 views
SNMPx von Amatullahbutt
SNMPx
Amatullahbutt
•
15 views
K8S Roadmap.pdf von MaryamTavakkoli2
K8S Roadmap.pdf
MaryamTavakkoli2
•
6 views
NEW SUPPLIERS SUPPLIES (copie).pdf von georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou
•
14 views
Object Oriented Programming with JAVA von Demian Antony D'Mello
Object Oriented Programming with JAVA
Demian Antony D'Mello
•
107 views
Electrical Crimping von Iwiss Tools Co.,Ltd
Electrical Crimping
Iwiss Tools Co.,Ltd
•
25 views
Activated sludge process .pdf von 8832RafiyaAltaf
Activated sludge process .pdf
8832RafiyaAltaf
•
8 views
Dynamics of Hard-Magnetic Soft Materials von Shivendra Nandan
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan
•
14 views
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... von IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES
•
13 views
SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
11 views
CHEMICAL KINETICS.pdf von AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
8 views
IWISS Catalog 2022 von Iwiss Tools Co.,Ltd
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
•
26 views
Saikat Chakraborty Java Oracle Certificate.pdf von SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
15 views
Digital Watermarking Of Audio Signals.pptx von AyushJaiswal781174
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal781174
•
8 views
MSA Website Slideshow (16).pdf von msaucla
MSA Website Slideshow (16).pdf
msaucla
•
58 views
802.11 Computer Networks von TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
9 views
fakenews_DBDA_Mar23.pptx von deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
12 views
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... von ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun
•
12 views
Informed search algorithms.pptx von Dr.Shweta
Informed search algorithms.pptx
Dr.Shweta
•
16 views
An approach of ontology and knowledge base for railway maintenance von IJECEIAES
An approach of ontology and knowledge base for railway maintenance
IJECEIAES
•
12 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2762 SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING USING SeDaSc Preethi P1, Priyadarshini J2, Soniya V3, A.S. Balaji4 1,2,3Student, Department of computer science, Anand Institute of Higher Technology Chennai, India 4Assistant Professor, Department of Computer Science Engineering, Anand Institute of Higher Technology, Chennai, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud storage liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. Cloud-specific and conventional insider threats are faced by data in case of group-shared data. The important issue is the Secure data sharing among a group that counters insider threats of legitimate yet malicious users. In this paper, we propose the Secure Data Sharing in Clouds (SeDaSC) methodology that provides: 1) data confidentiality and integrity; 2) access control; 3) data sharing (forwarding) withoutusingcompute- intensive reencryption; 4) insider threat security; and 5) forward and backward access control 6) One time download 7) Share Time Expire 8) Secret Key Management. The SeDaSC methodology encrypts a file with a single encryption key. The user gets only one share among the two different key shares that are generated for each user. The possession of a single share of a key allows the SeDaSC methodology to counter the insider threats. The other key share is stored by a trustedthird party, which is called the cryptographic server. The SeDaSC methodology is applicable to conventional and mobile cloud computing environments. We implement a workingprototype of the SeDaSC methodology and evaluate its performance based on the time consumed during various operations. We formally verify the working of SeDaSCbyusinghigh-levelPetri nets, the Satisfiability Modulo Theories Library, and a Z3 solver. The results proved to be encouraging and show that SeDaSC has the potential to be effectively used for secure data sharing in the cloud. Key Words: SeDaSc, reencryption, Key, cloud, Z3solver, etc… 1. INTRODUCTION CLOUD computing combining a set of existing and new techniques from research areas such as service-oriented architectures (SOA) and virtualization is considered as the next step in the evolution of on-demand information technology. It is routine for users to leverage cloud storage services to share data with others in a friend circle, e.g., Dropbox, Google Drive and Ali Cloud. The shared data in cloud servers, however, usually contains users’ sensitive information (e.g., personal profile, financial data, health records, etc.) and needs to be well protected. As the ownership of the data is separated from the administration of them, the cloud servers may migrate users’ data to other cloud servers in outsourcing or share them in cloud searching. Therefore, the big challenge is to protect the privacy of those shared data in cloud, especially in cross- cloud and big data environment. This challenge can be met by designing a comprehensive solution to support user- defined authorization period and to provide fine-grained access control during this period. After the user-defined expiration time the shared data should be self-destroyed. The data is stored in a common encrypted form to alleviate the problems. The user cannot share his/her encrypteddata at a fine-grained level whichisandisadvantageofencrypting data. The owner must know exact details of the one he/she wants to share with. In many applications, the data owner wants to share information with several users according to the security policy based on the users’ credentials. The significant advantagesofAttributebased encryption(ABE)is that it is based on the tradition publickeyencryptioninstead of one-to-one encryption because it achievesflexibleone-to- many encryption. To achieve both data security and fine- grained access control, the powerful method is provided by ABE scheme. In the key-policy ABE (KP-ABE) scheme the ciphertext is labeled with set of descriptive attributes. The user can get the plaintext only when the set of descriptive attributes satisfies the access structureinthekey.Ingeneral, the owner has the right to specify that certain sensitive information is only valid for a limited period of time, or should not be released before a particular time. In Timed- Release Encryption (TRE) an encryption key is associated with a predefined release time, and a receiver can only construct the corresponding decryption key in this time instance. On this basis, Paterson et al. proposed a time specific encryption (TSE) scheme, which is able to specify a suitable time interval such that the ciphertext can only be decrypted in this interval (decryption time interval, DTI). It can be used in many applications,e.g.,Internetprogramming contest, electronic sealed-bid auction, etc. Electronicsealed- bid auction is a method to establish the price of goods through the Internet whilekeepingthebidssecret during the bidding phase. That is, the bids (ciphertext) should be kept secret during the bidding phase (a specific time interval). Thus, in this paper, we attempt to solve these problems by using KPABE and adding a constraint of timeinterval toeach attribute in the set of decryption attributes.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2763 2. EXISTING SYSTEM In existing system, sharing data among users is perhaps one of the most engaging features that motivate’s cloud storage. Regarding availability of files, without the permission of the data owner, third party cannot access the files and without compromisingthedata owner’sanonymity. When a file is shared to multiple users, the problem occurs. 3. PROPOSED SYSTEM In this project, a key-policy attribute-based encryption with time-specified attributes (KP-TSABE), a novel secure data Autolysis of Data scheme in cloud computing.Inthe KP- TSABE scheme, every ciphertext is labeled with a time interval while private key is associated with a time instant. The ciphertext can only be decrypted if both the timeinstant is in the allowed time interval and the attributes associated with the ciphertext satisfy the key’s access structure. we propose the Secure Data Sharing in Clouds (SeDaSC) methodology that provides: 1) data confidentiality and integrity; 2) access control; 3) data sharing (forwarding) without using compute-intensive reencryption; 4) insider threat security; and 5) forward and backwardaccesscontrol 6) One time download 7) Share Time Expire 8) Secret Key Management. 4. OVERALL ARCHITECTURE Fig -1: overall architecture diagram 4.1 Authentication and Authorization First the user has to register and then the data base has to be accessed. After registration the user can login to the site. The whole mechanism from unauthorized usage will be protected and protect itself due to authorization and authentication. The user who wants to use this application, they have to register the details given. 4.2 File Encryption and data storing to cloud User shares the file which he want to Upload. At first the uploaded files are stored in the Local System. Then the user upload the file to the real Cloud Storage (In this application, we use Dropbox). The file gets encrypted by using AES (Advanced Encryption Standard) Algorithm andPrivateKey will be produced while uploading to cloud. Again the Encrypted Data is converted as Binary Data forData security and Stored in Cloud. 4.3 File Sharing The files which are uploaded in the cloudissharedtothe friends or users. The user who uploaded the file has to set the time to expire the data in Cloud. The Private Key of the Shared file will be send through Email. 4.4 File Decryption and download from cloud The user can download the data by decryption by using AES (Advanced Encryption Standard) Algorithm. Corresponding Private Keys should be given by the user to decrypt the data. The data will be deleted if the user enter the Wrong Private Key for Three times. Theintimationemail will be sent to the Data owner if the file got deleted. The Downloaded Data will be stored in Local Drive. 4.5 File Autolysis of data and access control The Data will be automatically deletediftheUserdoes not downloaded the file successfully with in the time given by the data owner. If the user download the data, then the File Autolysis will be disabled. If the File got deleted by File Autolysis scheme, the intimation Email will be sent to Data Owner. If data owner attach any malicious in our shared file then will intimate to shared user. In our website to block the backward access. Example. If a user to logout account then can’t go back our previous page. 5. CONCLUSION The proposed system the SeDaSC methodology, which is a cloud storage security scheme for group data. The proposed methodology provides data confidentiality, secure data sharing without reencryption, access control for malicious insiders, and forward and backward access control. Moreover, the SeDaSC methodology provides assured
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2764 deletion by deleting the parameters required to decrypt a file. 6. FUTURE ENHANCEMENT The future enhancement of the project is focused on the attempt to enhance security and also different types of advanced algorithm for Encryption may be used todevelope this application. We use Dropbox as a Cloud Server. In Future, we may developed that the user can select the Cloud Server such as Google Drive, Hostinger, Dropbox, AppBox He/She want. REFERENCES 1) Addressing Techniques for Secure Data Sharing in Cloud. Arti Bhagat,Nisha Rathee.IEEE,ICICCT2018. 2) Secured Cloud Data Sharing Using Auditable Aggregate Key. Pooja Pol and Amrit Priyadarshi. IEEE and ICAECCT 2016. 3) Modified Secret Sharing Algorithm for Secured Medical Data Sharing in Cloud Environment.Mr.K.A.Muthukumar and Dr.M.Nandhini. 2016 IEEE and ICONSTEM. 4) Hybrid Encryption TechniquesforSecureSharingof a Sensitive Data for Banking Systems Over Cloud.Prachi More , Shubham Chandugade , Shaikh Mohammad Shafi Rafiq and Prof. Priya Pise. 2018 IEEE and ICACCT 2018 5) A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service.NelmiawatandWahyudiArifandi.2018IEEE 6) B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditingfor shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–56, 2014. 7) J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma, “Priam: Privacy preserving identity and access managementschemeincloud,”KSIITransactionson Internet and Information Systems (TIIS), vol. 8, no. 1, pp. 282–304, 2014. 8) P. Jamshidi, A. Ahmad, and C. Pahl, “Cloudmigration research: A systematic review,” Cloud Computing, IEEE Transactions on, vol. 1, no. 2, pp. 142–157, 2013.
Jetzt herunterladen