Secure Group Data Sharing in Cloud Computing Using Role Based Encryption Techniques
Secure Group Data Sharing in Cloud Computing Using Role Based Encryption Techniques
International Journal for Modern Trends in Science and Technology, 8(08): 180-183, 2022
Copyright © 2022 International Journal for Modern Trends in Science and Technology
ISSN: 2455-3778 online
DOI: https://doi.org/10.46501/IJMTST0808025
Available online at: http://www.ijmtst.com/vol8issue08.html
Department of Information Technology, Mohamed Sathak Engineering college , Ramanathapuram, Tamil Nadu,
India.
Article Info
Received: 15 July 2022; Accepted: 10 August 2022; Published: 16 August 2022.
ABSTRACT
Cloud computing with the characteristics of inborn information sharing and upkeep, gives distant better; a much better; a
higher; stronger; improved stronger utilization of assets. In cloud computing cloud benefit suppliers offers a deliberation of
boundless capacity space for clients to have information. In any case, security concerns get to be the most limitations as the
capacity of information outsourcing, which is conceivably delicate to cloud suppliers. To protect information protection a
common approach is to scramble information records time recently clients transfer the scrambled information into the cloud. It is
troublesome to plan a secure and proficient information-sharing plot, particularly energetic Bunches within the cloud. The
proposed framework presents a secure get-to-control plot on scrambled information in cloud capacity by conjuring role-based
encryption methods (RBE). It is claimed that the conspire can accomplish proficient client denial that combines part-based
get-to-control approaches with encryption to secure huge information capacity in cloud computing. The method of Secure Gather
communication is utilized key conveyance without any secure communication channels. The clients can safely get their private
keys from the gather supervisor without any Certificate Specialists due to confirmation for the open key of the client. The
repudiated clients can not be able to urge the first information records once they are denied indeed in the event that they contrive
with the untrusted cloud.
KEYWORDS: cloud computing, low maintenance, infinite storage space, data outsource, encrypt data, dynamic group
REFERENCES
[1] DanDan C. Marinescu, Cloud Service Providers and the Cloud
Ecosystem, 2018, DOI- 10.1016/B978-0-12-812810-7.00002-9.
[2] Ajit N., SonalFatangare , Re-Encryption Scheme of Secure Data
Sharing for Dynamic Groups in the Cloud, 2017,
170 issue 7, pp 12 to 15
[3] Rui Zhou, Mingxing He, Certificate less Public Auditing Scheme
with Data Privacy Preserving for CloudStorage, 2021,
DOI: 10.1109/ICCCBDA51879.2021.9442586.
Figure 5.3 Community Request
[4] Rui Zhou, Mingxing He, Privacy-Preserving Public Auditing for
Shared Cloud Data With Secure Group Management, 2022,
DOI:10.1109/ ICCCBDA51879. 2021. 9442586
[5] Haining Yang, Ye Su, Jing Qin, Privacy-Preserving Outsourced
Inner Product Computation on Encrypt Database, 2020, Volume:
19, Issue: 2, DOI: 10.1109/ TDSC.2020.3001345.0
[6] Zhongma Zhu, Rui Jiang, A Secure Anti-Collusion Data Sharing
Scheme for Dynamic Groups in the Cloud, 2015,
DOI:10.1109/TPDS.2015.2388446.
[7] Rajashekhar S ,Vandana V , Vathsala P M , Vidya R , Vijaylaxmi,
A secure anti-collusion data sharing scheme for dynamic groups
in the cloud , Vol 7, Issue 2, pp 300-303.
[8] PandiVijayakumar, RamuNaresh, Lazarus Jegatha Deborah, SK
Figure 5.4 Group Member Login
Hafizul Islam, An efficient group key agreement protocol for
secure P2P communication, 2016, volume 9 issue 17 on
pages 3952 to 3965
[9] Z.Yu,G.Ziyu, T.Shulong, L.Haifeng, C.Deng, and H.Xiaofei,
Hetero generous hypergraph embedding for
documentrecommendation,Neurocomputing,vol.216,pp.150–162,
2016.
[10] RicciRicci, L. Rokach, and B. Shapira, Recommender systems:
Introduction and challenges, Springer, 2015, pp.1–34.
[11] Z.Wang, j.Liao, q.Cao, h.Qi, and z.Wang, Friend book: a semantic
based friend recommendation system for socialnetworks, vol.14,
no.3, pp.538–551, 2015.
Figure 5.5 File Transfer [12] ZapataZapata, V. H. Menendez, M. E. Prieto, and C. Romero,
Evaluation and selection of group recommendation strategies for
collaborative searching of learning objects,”,vol.76,
5. CONCLUSION pp.22–39,2015.
A bunch of key assertion issues, where a client is as it
were mindful of his neighbors whereas the network
chart is self-assertive. In expansion, clients are