CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Secure Group Sharing in Public Cloud Computing

by Preeti Gulab Sonar, Pratibha Dattu Shinde, Vishakha Ashok Patil, Rashmi Deepak Joshi, Madhuri Bhausaheb Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 11
Year of Publication: 2015
Authors: Preeti Gulab Sonar, Pratibha Dattu Shinde, Vishakha Ashok Patil, Rashmi Deepak Joshi, Madhuri Bhausaheb Patil
10.5120/ijca2015906546

Preeti Gulab Sonar, Pratibha Dattu Shinde, Vishakha Ashok Patil, Rashmi Deepak Joshi, Madhuri Bhausaheb Patil . A Novel Approach for Secure Group Sharing in Public Cloud Computing. International Journal of Computer Applications. 127, 11 ( October 2015), 47-50. DOI=10.5120/ijca2015906546

@article{ 10.5120/ijca2015906546,
author = { Preeti Gulab Sonar, Pratibha Dattu Shinde, Vishakha Ashok Patil, Rashmi Deepak Joshi, Madhuri Bhausaheb Patil },
title = { A Novel Approach for Secure Group Sharing in Public Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 11 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 47-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number11/22776-2015906546/ },
doi = { 10.5120/ijca2015906546 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:19:40.405943+05:30
%A Preeti Gulab Sonar
%A Pratibha Dattu Shinde
%A Vishakha Ashok Patil
%A Rashmi Deepak Joshi
%A Madhuri Bhausaheb Patil
%T A Novel Approach for Secure Group Sharing in Public Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 11
%P 47-50
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In world of Internet, the concept of group data sharing is gaining very high popularity. The privacy and security of group data sharing are the main issues which are to be considered while using this concept. Due to the semi-trust nature of the third party, it cannot be trusted and hence, security models used traditionally cannot be directly applied to the framework of cloud based group sharing. In this paper, implemented framework for a secure group sharing for public cloud, which can take the advantages of Cloud Server’s help very effectively. Only difference is that the chances of data insecurity would be reduced and the threat of data being exposed to attackers and cloud provider would be reduced simultaneously. Framework is formed by combining Proxy signature, enhanced TGDH and proxy re-encryption together into protocol. The use of proxy signature technique is that the group leader can grant the privilege of group management to one or more chosen group members. With the help of cloud servers, the enhanced TGDH scheme enables the group to update and negotiate group key pairs thus all group members need not to be online all the time. By using proxy re-encryption most of intensive operations which are to be performed computationally can be handed over to the cloud servers without the threat of disclosure of any private information. The security requirements for public cloud based secure group sharing are fulfilled by our proposed scheme with high efficiency and it can be proved by the extensive security and performance analysis.

References
  1. RFC2315, “PKCS #7: Cryptographic message syntax(version 1.5),” http://www.ietf.org/rfc/rfc2315.txt, Mar 1998.
  2. Y. Tang, P. Lee, J. Lui, and R. Perlman, “Secure overlay cloud stor- age with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903–916, 2012.
  3. K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” Ieee Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.
  4. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM 2010: Proc. The 29th Conference on Computer Communications. IEEE, 2010.
  5. D.H.Tran,H.L.Nguyen,W.Zha,andW.K.Ng,“Towardssecuri- ty in sharing data on cloud-based social networks,” in ICICS 2011: Proc. 8th International Conference on Information, Communications and Signal Processing. IEEE CS, 2011.
  6. W. Jia, H. Zhu, Z. Cao, L. Wei, and X. Lin, “SDSM: A secure data service mechanism in mobile cloud computing,” in WKSHPS 2011: Proc. 2011 IEEE Conference on Computer Communications Workshops. IEEE CS, 2011, pp. 1060–1065.
  7. P. Tysowski and M. Hasan, “Hybrid attribute-and re-encryption- based key management for secure and scalable mobile applica- tions in clouds,” IEEE Transactions on Cloud Computing, vol. 1, no. 2, pp. 172–186, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

TGDH(Tree-based Group Diffie-Hellman) PRL(Privileged revocation List) GL(Groupleader) GM(Groupmembers) GA (Groupadmin) PUDs (Personal Domains) PHR (Personal health records).