Downloads: 113 | Views: 243
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.3 / 10
Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud
J. Pratheeka, Dr. M. Nagaratna
Abstract: The major aim of this technique is a secure multi-owner knowledge sharing theme. It indicates that any user within the cluster will firmly share knowledge with others by the world organization trust worthy cloud. This theme is ready to support dynamic teams. Efficiently, specifically, new granted users will directly rewrite knowledge files uploaded before their participation whereas not contacting with knowledge owners. User revocation square measure is just achieved through a very distinctive revocation list whereas not modification of the key. The keys of the remaining users then the size and computation overhead of cryptography square measure constant and freelance with the amount of revoked users. Weve a bent to gift a secure and privacy-preserving access management to users that guarantee any member throughout a cluster to anonymously utilize the cloud resources. Moreover, the $64000 identities of information owners square measure disclosed by the cluster manager once disputes occur. We offer rigorous security analysis, and perform intensive simulations to demonstrate the potency of our theme in terms of storage and computation overhead. Cloud computing provides a cheap associated economical resolution for sharing cluster resource among cloud users sharing knowledge associate degree passing throughout a terribly multi-owner manner whereas protecting knowledge Associate in Nursing identity privacy from an world organization responsible cloud continues to be a issue, because of the frequent modification of the membership.
Keywords: Multi owner, Cloud, resource, cluster manager, revocation, Key Distribution
Edition: Volume 3 Issue 8, August 2014
Pages: 1684 - 1686
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 947 - 949COVID-19 Prediction using Machine Learning Algorithms
Saily Suresh Patil
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh