0% found this document useful (0 votes)
6 views

Secure Group Data Sharing in Cloud Computing Using Role Based Encryption Techniques

The document presents a study on secure group data sharing in cloud computing using role-based encryption techniques, addressing security concerns associated with data outsourcing. It proposes a framework that combines role-based access control with encryption to ensure efficient user revocation and secure data management within dynamic groups. The system allows users to safely share and manage data while preventing unauthorized access, even if users are denied access to the cloud service.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Secure Group Data Sharing in Cloud Computing Using Role Based Encryption Techniques

The document presents a study on secure group data sharing in cloud computing using role-based encryption techniques, addressing security concerns associated with data outsourcing. It proposes a framework that combines role-based access control with encryption to ensure efficient user revocation and secure data management within dynamic groups. The system allows users to safely share and manage data while preventing unauthorized access, even if users are denied access to the cloud service.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

As per UGC guidelines an electronic bar code is provided to seure your paper

International Journal for Modern Trends in Science and Technology, 8(08): 180-183, 2022
Copyright © 2022 International Journal for Modern Trends in Science and Technology
ISSN: 2455-3778 online
DOI: https://doi.org/10.46501/IJMTST0808025
Available online at: http://www.ijmtst.com/vol8issue08.html

Secure Group Data Sharing in CloudComputing


using Role Based Encryption Techniques

S.Karthiyayini | Dr.B.Aysha Banu | Asfar Nisha.S | Rahima Banu.S | Riswana Fathima.R

Department of Information Technology, Mohamed Sathak Engineering college , Ramanathapuram, Tamil Nadu,
India.

To Cite this Article


S.Karthiyayini, Dr.B.Aysha Banu, Asfar Nisha.S, Rahima Banu.S and Riswana Fathima.R. Secure Group Data Sharing
in Cloud Computing using Role Based Encryption Techniques. International Journal for Modern Trends in Science
and Technology 2022, 8(08), pp. 180-183. https://doi.org/10.46501/IJMTST0808025

Article Info
Received: 15 July 2022; Accepted: 10 August 2022; Published: 16 August 2022.

ABSTRACT
Cloud computing with the characteristics of inborn information sharing and upkeep, gives distant better; a much better; a
higher; stronger; improved stronger utilization of assets. In cloud computing cloud benefit suppliers offers a deliberation of
boundless capacity space for clients to have information. In any case, security concerns get to be the most limitations as the
capacity of information outsourcing, which is conceivably delicate to cloud suppliers. To protect information protection a
common approach is to scramble information records time recently clients transfer the scrambled information into the cloud. It is
troublesome to plan a secure and proficient information-sharing plot, particularly energetic Bunches within the cloud. The
proposed framework presents a secure get-to-control plot on scrambled information in cloud capacity by conjuring role-based
encryption methods (RBE). It is claimed that the conspire can accomplish proficient client denial that combines part-based
get-to-control approaches with encryption to secure huge information capacity in cloud computing. The method of Secure Gather
communication is utilized key conveyance without any secure communication channels. The clients can safely get their private
keys from the gather supervisor without any Certificate Specialists due to confirmation for the open key of the client. The
repudiated clients can not be able to urge the first information records once they are denied indeed in the event that they contrive
with the untrusted cloud.

KEYWORDS: cloud computing, low maintenance, infinite storage space, data outsource, encrypt data, dynamic group

1. INTRODUCTION One illustration of an application course that can


Numerous current applications are actualized as advantage of, and make broad utilize of, a solid gather
dispersed frameworks. A few are conveyed by nature communication stage is a logical collaboration program.
(e.g., Collaboratory and conferencing computer Applications such as dispersed white sheets,
programs) whereas others are dispersed to meet inaccessible instrument control, informing frameworks,
load-balancing and fault-tolerance prerequisites (e.g., electronic scratch pads, and information sharing are
substance servers and fault-tolerant CORBA). Such characteristic clients of bunch communication.
applications regularly depend on dependable gathered Applications of this sort regularly include clients spread
communication to supply coordination between forms. over a wide area organize and may utilize different

180 International Journal for Modern Trends in Science and Technology


bunches [1]. Shockingly, few bunch communication 2. LITERATURE REVIEW
frameworks can work over a wide-area arrange and Certificate less Open Reviewing Plot with Information
indeed less join the get-to-control and other security Protection Protecting for Cloud Capacity Creator: Rui
administrations that these applications require. Zhou, Mingxing He [4] propose a viable RDIC conspire.
Gather communication frameworks are planned to Besides, numerous open inspecting plans authorize the
back communication between forms collaborating in third party inspector (TPA) to check the astuteness of
bunches. The bunch communication framework gives a further information and the TPA isn't completely
fundamental layer that does the work of keeping up the trusted. In this way, they take data security into
participation of the method bunch and dependably consideration. The downside of Certificate less Open
conveying messages sent to the bunch in an offbeat Inspecting Conspire with Information Security
dispersed framework Cloud computing with the Protecting for Cloud Capacity is less RDIC conspire.
characteristics of natural information sharing and low Additionally, numerous open inspecting plans
upkeep, gives distant better; a much better; a higher; a authorize the third party evaluator (TPA) to check the
stronger; improved higher utilization of assets. In cloud integrity of further information and the TPA isn't
computing cloud benefit suppliers offers a deliberation completely trusted.
of unbounded capacity space for clients to have privacy-preserving open examining for shared cloud
information [2]. In any case, security concerns got to be information with secure gather administration ruizhou,
the most imperative as we outsource the capacity of mingxing he,[5] They too appeared that a confirmation
information, which is conceivably delicate to cloud can be manufactured by a conniving assault, indeed on
suppliers. To protect information protection a common the off chance that a few challenged messages have been
approach is to scramble information records time erased. We at that point proposed an unused conspire
recently clients transfer the scrambled information into that's secure against the over assaults whereas giving
the cloud. It is troublesome to plan a secure and the same usefulness as their approach. The
productive information sharing scheme, especially disadvantage of the paper could be an unused gather
energetic Bunches within the cloud [3]. The Existing client has the private key utilizing confirmation and
framework of cryptographic capacity frameworks distinguishing the transcripts of this substance.
empowers secure information sharing on deceitful Privacy-preserving outsourced internal item
servers based on the methods that partition records into computation on scrambled database Haining yang, ye
record bunches and scramble each record bunch with a su, jingqin [6] they propose a development beneath this
record piece key. The framework had an overwhelming demonstrate for the inward item computation by
key dispersion overhead. utilizing the Internal Item Utilitarian Encryption (IPFE)
The proposed framework presents a secure as a building piece. We propose a fortified IPFE that
get-to-control plot on scrambled information in cloud changes these shortcomings. They develop an unused
capacity by conjuring role-based encryption procedures IPFE plot and utilize it to develop a proficient
(RBE). It is claimed that the plot can accomplish outsourced inward item computation plot. The
proficient client disavowal that combines part-based downside of there's procedure for verification can be
get-to-control arrangements with encryption to secure amplified and utilized as the premise for a verification
expansive information capacity in cloud computing. The conspire which is demonstrated secure against any sort
method of Secure Gather communication is utilized key of assault, given the Discrete Logarithm issue is
conveyance without any secure communication recalcitrant.
channels. The clients can safely get their private keys A secure anti-collusion information sharing conspire
from a bunch of supervisors without any Certificate for energetic bunches within the cloud, zhongmazhu,
Specialists due to confirmation for the open key of the ruijiang [7] the propose a secure information sharing
client. The repudiated clients can not be able to urge the plot which can be ensured from collaboration assault.
initial information records once they are repudiated The disavowed clients can not be able to induce the first
indeed in the event that they plan with the untrusted information records once they are denied indeed in the
cloud. event that they plan with the dependent cloud. The

181 International Journal for Modern Trends in Science and Technology


downsides of the paper are the clients can safely get and compute the particular set of security parameters,
their private keys from gathering chief Certificate such as gathering key matches.
Specialists and secure communication channels.
5. COMMUNICATION PORTAL
3. SYSTEM DESIGN A.Share Data
A.Systemarchitecture The bunch of individuals can share their information
with another part in the same bunch the information
will interpret by scrambled data.
B.Upload Data
The bunch of individuals can transfer the record to
gather pioneers. And the gathering pioneer can
re-encrypt the data.
C.Download File
The bunch of individuals more over downloads the
gather pioneer file.
D.Pair-Id Wise Group Key Protocol
The Pair-ID wise Group Key Protocol is used to identify
and verify the group member communication [9]. A
Figure3.1: Systemarchitecture Group Member can share or upload the
A framework plan is a method of characterizing the information/content; Pair-ID based Group Key
components of a framework such as the engineering, verification established. The protocol produce positive
modules, and components, the distinctive interfacing of Rate the communication original information is
those components, and the information go through that submitted to valid group members otherwise the
framework. It is implied to fulfill particular needs and protocol generate dummy information/content. The
necessities of commerce or organization through the generate dummy will send over to invalid group
building of a coherent and well-running framework. member.
E.Admin Authentication
4. SYSTEM IMPLEMENTATION The gather pioneer can authorize a few particular
A.Dynamic Community Management bunch individuals to assist with the administration of
The gather pioneer opens up a sharing zone within the the gather, and this benefit can too be evoked by the
cloud to create a group application. At that point, he/she bunch pioneer. And the Admin can acknowledge the
gifts the gathered individuals the proper to actualize modern client asks.
information administration. All the information in this
bunch is accessible to all the bunch individuals, whereas
they stay private towards the pariahs of the group
including the cloud supplier. The bunch pioneer can
authorize a few particular gathering individuals to
assist with the administration of the bunch, and this
benefit can moreover be denied by the gathering
pioneer [8]. When a part clears out the gather, he/she
will lose the capacity to download and peruse the
shared information once more.
B.Group Member
Each gathers part can execute record download and Figure 5.1 Community Name
transfer operations within the confirmed gather. Each
GM can get a few related open data from Cloud Servers

182 International Journal for Modern Trends in Science and Technology


initialized totally autonomous of each other. A bunch of
key assertions in this setting are exceptionally
reasonable for applications such as social systems. We
developed two latently secure conventions with
contributiveness and demonstrated lower bounds on a
circular complexity, illustrating that our conventions are
circular proficient. At long last, we built an effectively
secure convention from an inactively secure one.

Conflict of interest statement


Figure 5.2 Administration Login
Authors declare that they do not have any conflict of
interest.

REFERENCES
[1] DanDan C. Marinescu, Cloud Service Providers and the Cloud
Ecosystem, 2018, DOI- 10.1016/B978-0-12-812810-7.00002-9.
[2] Ajit N., SonalFatangare , Re-Encryption Scheme of Secure Data
Sharing for Dynamic Groups in the Cloud, 2017,
170 issue 7, pp 12 to 15
[3] Rui Zhou, Mingxing He, Certificate less Public Auditing Scheme
with Data Privacy Preserving for CloudStorage, 2021,
DOI: 10.1109/ICCCBDA51879.2021.9442586.
Figure 5.3 Community Request
[4] Rui Zhou, Mingxing He, Privacy-Preserving Public Auditing for
Shared Cloud Data With Secure Group Management, 2022,
DOI:10.1109/ ICCCBDA51879. 2021. 9442586
[5] Haining Yang, Ye Su, Jing Qin, Privacy-Preserving Outsourced
Inner Product Computation on Encrypt Database, 2020, Volume:
19, Issue: 2, DOI: 10.1109/ TDSC.2020.3001345.0
[6] Zhongma Zhu, Rui Jiang, A Secure Anti-Collusion Data Sharing
Scheme for Dynamic Groups in the Cloud, 2015,
DOI:10.1109/TPDS.2015.2388446.
[7] Rajashekhar S ,Vandana V , Vathsala P M , Vidya R , Vijaylaxmi,
A secure anti-collusion data sharing scheme for dynamic groups
in the cloud , Vol 7, Issue 2, pp 300-303.
[8] PandiVijayakumar, RamuNaresh, Lazarus Jegatha Deborah, SK
Figure 5.4 Group Member Login
Hafizul Islam, An efficient group key agreement protocol for
secure P2P communication, 2016, volume 9 issue 17 on
pages 3952 to 3965
[9] Z.Yu,G.Ziyu, T.Shulong, L.Haifeng, C.Deng, and H.Xiaofei,
Hetero generous hypergraph embedding for
documentrecommendation,Neurocomputing,vol.216,pp.150–162,
2016.
[10] RicciRicci, L. Rokach, and B. Shapira, Recommender systems:
Introduction and challenges, Springer, 2015, pp.1–34.
[11] Z.Wang, j.Liao, q.Cao, h.Qi, and z.Wang, Friend book: a semantic
based friend recommendation system for socialnetworks, vol.14,
no.3, pp.538–551, 2015.
Figure 5.5 File Transfer [12] ZapataZapata, V. H. Menendez, M. E. Prieto, and C. Romero,
Evaluation and selection of group recommendation strategies for
collaborative searching of learning objects,”,vol.76,
5. CONCLUSION pp.22–39,2015.
A bunch of key assertion issues, where a client is as it
were mindful of his neighbors whereas the network
chart is self-assertive. In expansion, clients are

183 International Journal for Modern Trends in Science and Technology

You might also like