Downloads: 113 | Views: 223
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.3 / 10
Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud
J. Pratheeka, Dr. M. Nagaratna
Abstract: The major aim of this technique is a secure multi-owner knowledge sharing theme. It indicates that any user within the cluster will firmly share knowledge with others by the world organization trust worthy cloud. This theme is ready to support dynamic teams. Efficiently, specifically, new granted users will directly rewrite knowledge files uploaded before their participation whereas not contacting with knowledge owners. User revocation square measure is just achieved through a very distinctive revocation list whereas not modification of the key. The keys of the remaining users then the size and computation overhead of cryptography square measure constant and freelance with the amount of revoked users. Weve a bent to gift a secure and privacy-preserving access management to users that guarantee any member throughout a cluster to anonymously utilize the cloud resources. Moreover, the $64000 identities of information owners square measure disclosed by the cluster manager once disputes occur. We offer rigorous security analysis, and perform intensive simulations to demonstrate the potency of our theme in terms of storage and computation overhead. Cloud computing provides a cheap associated economical resolution for sharing cluster resource among cloud users sharing knowledge associate degree passing throughout a terribly multi-owner manner whereas protecting knowledge Associate in Nursing identity privacy from an world organization responsible cloud continues to be a issue, because of the frequent modification of the membership.
Keywords: Multi owner, Cloud, resource, cluster manager, revocation, Key Distribution
Edition: Volume 3 Issue 8, August 2014
Pages: 1684 - 1686
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Downloads: 106
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
Downloads: 106
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash