CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud

by M. Siva Kishore, P. Naga Lakshmi, B. Tarakeswara Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 15
Year of Publication: 2015
Authors: M. Siva Kishore, P. Naga Lakshmi, B. Tarakeswara Rao
10.5120/ijca2015907675

M. Siva Kishore, P. Naga Lakshmi, B. Tarakeswara Rao . Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud. International Journal of Computer Applications. 132, 15 ( December 2015), 42-46. DOI=10.5120/ijca2015907675

@article{ 10.5120/ijca2015907675,
author = { M. Siva Kishore, P. Naga Lakshmi, B. Tarakeswara Rao },
title = { Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 15 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number15/23674-2015907675/ },
doi = { 10.5120/ijca2015907675 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:32.240687+05:30
%A M. Siva Kishore
%A P. Naga Lakshmi
%A B. Tarakeswara Rao
%T Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 15
%P 42-46
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing offers an economical and efficient solution for sharing data among the cloud users with low support without the weight of neighborhood data storing and upkeep. In any case, the administration of the data and services may not be completely dependable on the cloud, as users no longer have physical possession of the outsourced personal data so data integrity protection turns into a troublesome assignment. Keeping up the integrity of shared data services where data is shared among various cloud users is likewise a testing undertaking. This paper gives effective user revocation on multi-owner dynamic group sharing and for that it utilizes Homomorphic straight authenticator with random veiling procedure. Homomorphic authenticable proxy signature scheme with public auditing mechanism checks imparted data integrity along to efficient user revocation. Moreover, these systems can bolster clump inspecting by checking multiple evaluating errands at the same time.

References
  1. Boyang Wang, Baochun Li and Hui Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud”, IEEE Transactions on services computing, vol. 8, no. 1, January/February 2015.
  2. B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, Proc. IEEE CLOUD, pp. 295-302, 2014.
  3. H. Wang, “Proxy Provable Data Possession in Public Clouds”, IEEE Trans. Services Computing, vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
  4. C. Wang, Q. Wang, K. Ren ,“Privacy-Preserving Public Auditing for Secure Cloud Storage Auditing”, IEEE transaction on computer, 2013.
  5. C. Wang, Q. Wang, K. Ren, and W. Lou, “PrivacyPreserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 525-533, 2010.
  6. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing”,Proc. 14th European Conf. Research in Computer Security (ESORICS09), pp. 355- 370, 2009.
  7. H. Shacham and B. Waters, “Compact Proofs of Retrievability”, Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT08), pp. 90-107, 2008.
  8. G. Ateniese, R. Burns, R. Curtmola, J. Herring, LKissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores”, Proc. 14th ACM Conf. Computer and Comm. Security (CCS07), pp. 598-610, 2007.
  9. Shamir, “How to Share a Secret”, Comm. ACM, vol. 22, no. 11,pp.612-613,No v. 1979.
Index Terms

Computer Science
Information Sciences

Keywords

Proxy Server privacy-preserving public auditing shared data user revocation cloud computing.