Downloads: 143
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016
A Secured Dynamic Group Sharing with V2 Signature and Encryption Techniques in Public Cloud
Rajani Sajjan | Vijay Ghorpade | Nayantara Yerate
Abstract: Cloud systems can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user. As group data sharing in public cloud computing has gained lots of popularity, providing privacy and security to the data shared has become top most priority. The cloud has a semi-trust kind and so it needs a security model which has no confidential data being exposed to cloud providers and attackers. Another important factor in providing privacy and security is periodic removal of unwanted files which if not done regularly then, may become a part of interest for attackers and can be misused. For this purpose, a secure group sharing framework for public cloud is proposed which combines V2Signature Admin and Broadcast Encryption Techniques. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. The shared data will have a predefined life span which will be specified by data owner. When the life span expires, the group admin is responsible to ask the members whether they need that file anymore and take action accordingly. A very high authentication is required to achieve identity privacy.
Keywords: Identity Privacy, V2 Signature, Life Span
Edition: Volume 5 Issue 2, February 2016,
Pages: 83 - 86
Similar Articles with Keyword 'Identity Privacy'
Downloads: 103
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 2058 - 2061Privacy Preserved Public Auditing for Distributed Data
Anes P. A. [2] | Neethu Francis [2]
Downloads: 110
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2124 - 2127A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
Mahesh Shinde | Y.B.Gurav [3]