SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 106
AN EFFICIENT SCHEME FOR DATA SHARING AMONG DYNAMIC CLOUD
MEMBERS
Mahejuba Soudagar1, Rajashekhar D. Salagar2
1M.Tech Student, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of
Engineering & Technology Vijayapur, Karnataka, India
2Assistant Professor, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of
Engineering & Technology Vijayapur, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cloud Computing, has the properties of sharing
information and the cost of management maintainenceisless.
Cloud Computing provides a high usage of resource. Sharing
the data along with giving privacy is a challenging issue
because of the frequent change in membership. In this
research work, we propose a scheme for sharing data which is
secure for dynamic members. First, key distribution method is
proposed withoutanycommunicationchannels, andtheGroup
Managers provide keys to users. Second, fine grained access
control can be achieved, cloud data can be used by any user
within the cloud and users who are revoked cannot access the
cloud. Third, the scheme is protected from collusion attack, i.e
revoked users after they are revoked won’t be able to get the
original data even if they join with the third party cloud.
Key Words: key distribution, privacy-preserving, fine
grained access control (FGAC).
1. INTRODUCTION
Cloud Computing, has the properties of sharing information
and the cost of management maintenance is less. Cloud
Computing provides a high usage of resource, It is the next
most important step in the evolution of information
technology, which includes many of and new and already
existing technologies such as SOAs(Service Oriented
Architecture) and virtualization. However, data shared in
cloud usually contains personal information (such as
personal profile, financial data, health records, etc.) and
hence it must be well secured. Since we obtain data from
third party servers, which is sensitive to cloud providers so
security is the main constraint. A common method to
maintain data privacy is encrypting data files before
uploading it to cloud[2]. However, it is difficult to have such
a scheme, especially for groups in the cloud.
A secured storage system which provides cryptography is
used which gives a data sharing scheme on untrustworthy
servers which is based on some techniques which includes
encryption that is encryption is performed on separate
single file group using file block key, and dividing the data
files into separate file groups. But for revocation of usersthe
keys of file-block should be distributed and updated. The
complexities of user revocation and participation in these
schemes are increasing with the number of revoked users
and the data owners
These are the main offerings of our scheme:
1) This scheme gives a secure method of key distribution
without using any secure channels. Theregisteredusers
here obtain their private keys without using any
certificate authoritiessecurelyfromthegroupmanagers
2) Fine-grained access control can be achieved using this
scheme, also any registered user present in the group
can use the cloud resource using the group user list and
the users who are revoked won’t be able to get the data
from cloud after they are revoked.
3) The main benefit of this scheme is that data is secure
from collusion attack also the data sharing process is
safe and secure. Once any user is revoked he cannot
obtain the originally existing data file even if they join
hands with third party servers.
4) Dynamic groups can be handled efficiently by our
scheme, so whenever any user gets added in group or a
user is revoked who has already joined, other user’s
private keys need not be computed and updated again.
2. LITERATURE SURVEY
A. Survey on: Cryptographic Cloud Storage: We look into
the difficulty of constructing a service of secure cloud
storage on the peak of public cloud architecturewhereclient
does not trust the cloud service provider. Cloud storage can
be grouped into two types as private and public cloud
[1].The customer owns the private cloud and only trusted
bodies have access to the private cloud. The cloud service
provider owns the public cloud where data is out of control
and could be attacked by third parties.
B. Survey on: Improved Proxy Re-Encryption Schemes
with Applications to Secure DistributedStorage:In1998,
Blaze, Bloomer, and Strauss (BBS) proposed an application
called atomic proxy re-encryption, in which a semi-trusted
proxy converts a ciphertext for Alice into a ciphertext for
Bob without seeing the underlying plaintext. Proxy re-
encryption[3] allows a proxy to transform a ciphertext
computed under Alice’s public key into one that can be
opened by Bob’s secret key, but this method isnotsecure[2].
The primary advantage of our schemes is that they are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 107
unidirectional (i.e., Alice can delegate to Bob without Bob
having to delegate to her) and do not require delegators to
reveal all of their secret key to anyone – or even interact
with the delegate – in order to allow a proxy to re-encrypt
their ciphertexts.
C. Survey on: Mona:SecureMulti-Owner DataSharing for
Dynamic Groups in the Cloud: Sharing data in a multi-
owner way while preserving data and from an untrusted
cloud is still a challenging issue, mainly due to the frequent
change of the membership. To preserve data privacy, a
simple solution is encrypting data files, and then uploading
the encrypted data into the cloud. Thus to achieve the
reliable and scalable in MONA[4], in this paper we are
presenting new framework for MONA. Inthismethod we are
also presenting how to manage the risks like failureofgroup
manager by increasing the number of backup group
manager, hanging of group manager in case number of
requests more by sharing the workload in multiple group
managers.
3. EXISTING SYSTEM
The existing methods to retrieve the fine grain data access
control of key policy attribute is based on“encryption,proxy
re-encryption and lazy re-encryption [9]”. It does not reveal
any information about the data. But any group member can
utilize the cloud service for storing and sharing data that
may hide the implementation of applications. One methodis
to provide group signatures and encryption methods for a
secure scheme. After registration every user will get two
keys one for encryption and other for decryption which is
attribute key[5]. A secure way of using encrypted file is by
role based encryption algorithms. This scheme is efficient
scheme in terms of storage for user revocation that
combines encryption with role based accesscontrol policies.
However verification of users are not taken into view. In the
proposed system every user gets verified by the cloud
admin.
3.1 Disadvantage in existing system:
 A secure and efficient data sharing scheme is difficult to
design.
 Key distribution overhead is large.
 The verifications of users are not done so it leads to
collusion attack
 There is a weak protection of commitment in the stage
of identity token. So it is unsecure.
4. THE PROPOSED SCHEME
4.1 Preliminaries
1)(Basic Diffe-Hellman Problem (BDHP) Assumption
[6]): Specified base point P and a value γ € It is easy to
calculate γ.P. However, given P,γ.P,itisinfeasibletocalculate
γ since of the discrete algorithm problem.
2)(Decisional Diffie-Hellman Problem (DDHP)
Assumption [7]):
Notation Description
IDEi the identity of user i
IDdatai the identity of data i
qk the public key of the user
tk the private that Needs to be negotiated
with the group manager
KEY=(xi,Ai,B) the private key which is Distributed to the
user from the Group manger and used for
data Sharing
base point Q is infeasible to compute b Q.
and aQ,(a+b)Q
Definition 3 (Weak Bilinear Diffie-Hellman Exponent
[8])
Encpk(): Symmetric encryption algorithm used in the
encryption key k
ASENC(): Asymmetric encryption Algorithm used in the
encryption key ULI group user list DLI data list[6]
4.2 ALGORITHM/TECHNIQUE USED:
Elliptic Curve Cryptography (ECC): was discovered in 1985
by Victor Miller (IBM) and Neil Koblitz (University of
Washington) as an alternative mechanism forimplementing
public-key cryptography.
The equation of an elliptic curve is given as, y2=x3 + ax + b
Few terms that will be used
E -> Elliptic Curve
P -> Point on the Curve
N -> Maximum limit (Prime number)
Key Generation: Key generation creates both public key
and private key. The sender will be encrypting the message
with receiver’s public keyandthereceiver will decryptusing
its private key. Now, we have to select a number ‘d’ within
the range of ‘n’.
Using the following equation we can generate the public key
Q = d * P.
d = The random number that we have selected within the
range of (1 to n-1). P is the point on the curve. ‘Q’ is the
public key and ‘d’ is the private key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 108
1) Encryption: Let ‘m’ be the message that we are
transferring. We should represent this onthecurve. Thishas
in-depth implementationdetails.All theadvanceresearchon
ECC is done by a company called certicom. Consider ‘m’ has
the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from [1 –
(n-1)].
Two cipher texts gets generated let it be C1 and C2.
C1 = k*P and C2 = M + k*Q. C1 and C2 are sent.
2) Decryption: We have to get back the message ‘m’ that
was sent to us, M = C2 – d * C1
M is the original message that we have sent.
4.3 SYSTEM ARCHITECTURE:
Fig -1: System Architecture
Shown in Fig. 1 above, there are 3 different entities included
under the system model: the cloud, a group manager and
many group members.
 The cloud It is the storage space available to the users
on payment basis. It is maintained by the CSP. This
becomes untrusted since CSP can be easily untrusted.
 Group manager is the one whohastheauthorityofnew
user registration with the group anduserrevocation.He
is the owner of the group so he is fully trustable.
 Group members or group (users) are the one that are
registered by group manager. He can store their own
data into the cloud and share them with other cloud
member. Due to the new user registration and user
revocation, the group membership varies vigorously.
4.4 Design Goals
Important design goals of our scheme are:
1) Key distribution: The users can get their private keys
from the group manager securely. This is key
distributions which do not need any certificates
authorities or channel. In other systems a secure
communication channel is required
2) Access control: Access control includes three main
points. First, Members within the group can utilize the
resources provided by cloud for storing and sharing
data. Second, the users who are not authorized wont be
able to utilize the resources of cloud. The revoked users
also cannot use resources after being revoked
3) Data confidentiality: Data confidentiality means that
unauthorized users including the cloud should not be
able to learn information stored in cloud. However
preserving the data confidentiality is a challengingissue
for dynamic groups. Revoked users cannot decrypt the
data after the revocation.
4) Efficiency: Main requirement of efficiency is that any
group member can save the data files or share the data
files with other group members of the cloud. Alsohereit
is very easy to revoke users without informing others
that is users need not update their keys.
5. ADVANTAGES
 The cost is not dependent on the number of the revoked
users. Because file uploads cost computation is
dependent on two signature verifications. These
signature verifications are irrelevanttonumberofusers
revoked. In RBAC scheme the cost of computation is
small because communication verification is not
concerned. In our scheme, securely the users can get their private
keys from group manager Certificate Authorities. Also,
our scheme can maintain dynamic groups efficiently,
whenever new users connect to the group, the other
users’ private keys need not to be recalculated and
updated.
6. CONCLUSION
We have proposed a secure anti-collusion scheme for data
sharing among dynamic groups in the cloud which is an
efficient method. Here in this scheme, users can get hold of
their private keys securely from group manager, secure
communication channels and certificate Authorities. Our
scheme also supports dynamic groups very efficiently, the
private keys of the other users need not to be computed
again and updated when a new user register in the group or
an existing user is exited from the group. However, our
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 109
scheme achieves secure user revocation, the revoked users
cannot obtain the original data after they are removed or
exited even if they joins with the untrusted 3rd parties.
REFERENCES
[1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,”
Proc. Int’l Conf. Financial Cryptography and Data Security
(FC), pp.136- 149, Jan. 2010.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure,
scalable, and fine-grained data access control in cloud
computing,” in Proc. ACM Symp. Inf., Comput. Commun.
Security, 2010, pp. 282–292.
[3] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxyre-encryptionschemeswithapplicationsto
secure distributed storage,” in Proc. Netw. Distrib. Syst.
Security Symp., 2005, pp. 29–43.
[4] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure
multiowner data sharing for dynamic groups in the cloud,”
IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182–
1191, Jun. 2013.
[5] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure
multiowner data sharing for dynamic groupsinthecloud,”in
Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185–
189.
[6] B. Den Boer, “Diffie–Hellman is as strong as discrete log
for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530.
[7] D. Boneh, X. Boyen, and H. Shacham, “Short group
signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology,
2004, pp. 41–55.
[8] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity
based encryption with constant size ciphertext,” in Proc.
Annu. Int. Conf. TheoryAppl. Cryptographic Techn.,2005, pp.
440–456.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proc. ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.z

More Related Content

What's hot (20)

IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
50120140507006
5012014050700650120140507006
50120140507006
IAEME Publication
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
cscpconf
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
csandit
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
82 86
82 8682 86
82 86
Editor IJARCET
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
cscpconf
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
csandit
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 

Similar to An Efficient Scheme for Data Sharing Among Dynamic Cloud Members (20)

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

Redirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to RickrollsRedirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to Rickrolls
Kritika Garg
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Building-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdfBuilding-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdf
Lawrence Omai
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Redirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to RickrollsRedirects Unraveled: From Lost Links to Rickrolls
Redirects Unraveled: From Lost Links to Rickrolls
Kritika Garg
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Building-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdfBuilding-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdf
Lawrence Omai
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1Computer Security Fundamentals Chapter 1
Computer Security Fundamentals Chapter 1
remoteaimms
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 

An Efficient Scheme for Data Sharing Among Dynamic Cloud Members

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 106 AN EFFICIENT SCHEME FOR DATA SHARING AMONG DYNAMIC CLOUD MEMBERS Mahejuba Soudagar1, Rajashekhar D. Salagar2 1M.Tech Student, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of Engineering & Technology Vijayapur, Karnataka, India 2Assistant Professor, Department of Computer Science and Engineering, BLDEA’s V.P. Dr.P.G.Halakatti College of Engineering & Technology Vijayapur, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing, has the properties of sharing information and the cost of management maintainenceisless. Cloud Computing provides a high usage of resource. Sharing the data along with giving privacy is a challenging issue because of the frequent change in membership. In this research work, we propose a scheme for sharing data which is secure for dynamic members. First, key distribution method is proposed withoutanycommunicationchannels, andtheGroup Managers provide keys to users. Second, fine grained access control can be achieved, cloud data can be used by any user within the cloud and users who are revoked cannot access the cloud. Third, the scheme is protected from collusion attack, i.e revoked users after they are revoked won’t be able to get the original data even if they join with the third party cloud. Key Words: key distribution, privacy-preserving, fine grained access control (FGAC). 1. INTRODUCTION Cloud Computing, has the properties of sharing information and the cost of management maintenance is less. Cloud Computing provides a high usage of resource, It is the next most important step in the evolution of information technology, which includes many of and new and already existing technologies such as SOAs(Service Oriented Architecture) and virtualization. However, data shared in cloud usually contains personal information (such as personal profile, financial data, health records, etc.) and hence it must be well secured. Since we obtain data from third party servers, which is sensitive to cloud providers so security is the main constraint. A common method to maintain data privacy is encrypting data files before uploading it to cloud[2]. However, it is difficult to have such a scheme, especially for groups in the cloud. A secured storage system which provides cryptography is used which gives a data sharing scheme on untrustworthy servers which is based on some techniques which includes encryption that is encryption is performed on separate single file group using file block key, and dividing the data files into separate file groups. But for revocation of usersthe keys of file-block should be distributed and updated. The complexities of user revocation and participation in these schemes are increasing with the number of revoked users and the data owners These are the main offerings of our scheme: 1) This scheme gives a secure method of key distribution without using any secure channels. Theregisteredusers here obtain their private keys without using any certificate authoritiessecurelyfromthegroupmanagers 2) Fine-grained access control can be achieved using this scheme, also any registered user present in the group can use the cloud resource using the group user list and the users who are revoked won’t be able to get the data from cloud after they are revoked. 3) The main benefit of this scheme is that data is secure from collusion attack also the data sharing process is safe and secure. Once any user is revoked he cannot obtain the originally existing data file even if they join hands with third party servers. 4) Dynamic groups can be handled efficiently by our scheme, so whenever any user gets added in group or a user is revoked who has already joined, other user’s private keys need not be computed and updated again. 2. LITERATURE SURVEY A. Survey on: Cryptographic Cloud Storage: We look into the difficulty of constructing a service of secure cloud storage on the peak of public cloud architecturewhereclient does not trust the cloud service provider. Cloud storage can be grouped into two types as private and public cloud [1].The customer owns the private cloud and only trusted bodies have access to the private cloud. The cloud service provider owns the public cloud where data is out of control and could be attacked by third parties. B. Survey on: Improved Proxy Re-Encryption Schemes with Applications to Secure DistributedStorage:In1998, Blaze, Bloomer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. Proxy re- encryption[3] allows a proxy to transform a ciphertext computed under Alice’s public key into one that can be opened by Bob’s secret key, but this method isnotsecure[2]. The primary advantage of our schemes is that they are
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 107 unidirectional (i.e., Alice can delegate to Bob without Bob having to delegate to her) and do not require delegators to reveal all of their secret key to anyone – or even interact with the delegate – in order to allow a proxy to re-encrypt their ciphertexts. C. Survey on: Mona:SecureMulti-Owner DataSharing for Dynamic Groups in the Cloud: Sharing data in a multi- owner way while preserving data and from an untrusted cloud is still a challenging issue, mainly due to the frequent change of the membership. To preserve data privacy, a simple solution is encrypting data files, and then uploading the encrypted data into the cloud. Thus to achieve the reliable and scalable in MONA[4], in this paper we are presenting new framework for MONA. Inthismethod we are also presenting how to manage the risks like failureofgroup manager by increasing the number of backup group manager, hanging of group manager in case number of requests more by sharing the workload in multiple group managers. 3. EXISTING SYSTEM The existing methods to retrieve the fine grain data access control of key policy attribute is based on“encryption,proxy re-encryption and lazy re-encryption [9]”. It does not reveal any information about the data. But any group member can utilize the cloud service for storing and sharing data that may hide the implementation of applications. One methodis to provide group signatures and encryption methods for a secure scheme. After registration every user will get two keys one for encryption and other for decryption which is attribute key[5]. A secure way of using encrypted file is by role based encryption algorithms. This scheme is efficient scheme in terms of storage for user revocation that combines encryption with role based accesscontrol policies. However verification of users are not taken into view. In the proposed system every user gets verified by the cloud admin. 3.1 Disadvantage in existing system:  A secure and efficient data sharing scheme is difficult to design.  Key distribution overhead is large.  The verifications of users are not done so it leads to collusion attack  There is a weak protection of commitment in the stage of identity token. So it is unsecure. 4. THE PROPOSED SCHEME 4.1 Preliminaries 1)(Basic Diffe-Hellman Problem (BDHP) Assumption [6]): Specified base point P and a value γ € It is easy to calculate γ.P. However, given P,γ.P,itisinfeasibletocalculate γ since of the discrete algorithm problem. 2)(Decisional Diffie-Hellman Problem (DDHP) Assumption [7]): Notation Description IDEi the identity of user i IDdatai the identity of data i qk the public key of the user tk the private that Needs to be negotiated with the group manager KEY=(xi,Ai,B) the private key which is Distributed to the user from the Group manger and used for data Sharing base point Q is infeasible to compute b Q. and aQ,(a+b)Q Definition 3 (Weak Bilinear Diffie-Hellman Exponent [8]) Encpk(): Symmetric encryption algorithm used in the encryption key k ASENC(): Asymmetric encryption Algorithm used in the encryption key ULI group user list DLI data list[6] 4.2 ALGORITHM/TECHNIQUE USED: Elliptic Curve Cryptography (ECC): was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) as an alternative mechanism forimplementing public-key cryptography. The equation of an elliptic curve is given as, y2=x3 + ax + b Few terms that will be used E -> Elliptic Curve P -> Point on the Curve N -> Maximum limit (Prime number) Key Generation: Key generation creates both public key and private key. The sender will be encrypting the message with receiver’s public keyandthereceiver will decryptusing its private key. Now, we have to select a number ‘d’ within the range of ‘n’. Using the following equation we can generate the public key Q = d * P. d = The random number that we have selected within the range of (1 to n-1). P is the point on the curve. ‘Q’ is the public key and ‘d’ is the private key.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 108 1) Encryption: Let ‘m’ be the message that we are transferring. We should represent this onthecurve. Thishas in-depth implementationdetails.All theadvanceresearchon ECC is done by a company called certicom. Consider ‘m’ has the point ‘M’ on the curve ‘E’. Randomly select ‘k’ from [1 – (n-1)]. Two cipher texts gets generated let it be C1 and C2. C1 = k*P and C2 = M + k*Q. C1 and C2 are sent. 2) Decryption: We have to get back the message ‘m’ that was sent to us, M = C2 – d * C1 M is the original message that we have sent. 4.3 SYSTEM ARCHITECTURE: Fig -1: System Architecture Shown in Fig. 1 above, there are 3 different entities included under the system model: the cloud, a group manager and many group members.  The cloud It is the storage space available to the users on payment basis. It is maintained by the CSP. This becomes untrusted since CSP can be easily untrusted.  Group manager is the one whohastheauthorityofnew user registration with the group anduserrevocation.He is the owner of the group so he is fully trustable.  Group members or group (users) are the one that are registered by group manager. He can store their own data into the cloud and share them with other cloud member. Due to the new user registration and user revocation, the group membership varies vigorously. 4.4 Design Goals Important design goals of our scheme are: 1) Key distribution: The users can get their private keys from the group manager securely. This is key distributions which do not need any certificates authorities or channel. In other systems a secure communication channel is required 2) Access control: Access control includes three main points. First, Members within the group can utilize the resources provided by cloud for storing and sharing data. Second, the users who are not authorized wont be able to utilize the resources of cloud. The revoked users also cannot use resources after being revoked 3) Data confidentiality: Data confidentiality means that unauthorized users including the cloud should not be able to learn information stored in cloud. However preserving the data confidentiality is a challengingissue for dynamic groups. Revoked users cannot decrypt the data after the revocation. 4) Efficiency: Main requirement of efficiency is that any group member can save the data files or share the data files with other group members of the cloud. Alsohereit is very easy to revoke users without informing others that is users need not update their keys. 5. ADVANTAGES  The cost is not dependent on the number of the revoked users. Because file uploads cost computation is dependent on two signature verifications. These signature verifications are irrelevanttonumberofusers revoked. In RBAC scheme the cost of computation is small because communication verification is not concerned. In our scheme, securely the users can get their private keys from group manager Certificate Authorities. Also, our scheme can maintain dynamic groups efficiently, whenever new users connect to the group, the other users’ private keys need not to be recalculated and updated. 6. CONCLUSION We have proposed a secure anti-collusion scheme for data sharing among dynamic groups in the cloud which is an efficient method. Here in this scheme, users can get hold of their private keys securely from group manager, secure communication channels and certificate Authorities. Our scheme also supports dynamic groups very efficiently, the private keys of the other users need not to be computed again and updated when a new user register in the group or an existing user is exited from the group. However, our
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 109 scheme achieves secure user revocation, the revoked users cannot obtain the original data after they are removed or exited even if they joins with the untrusted 3rd parties. REFERENCES [1] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp.136- 149, Jan. 2010. [2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [3] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxyre-encryptionschemeswithapplicationsto secure distributed storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43. [4] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure multiowner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182– 1191, Jun. 2013. [5] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure multiowner data sharing for dynamic groupsinthecloud,”in Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185– 189. [6] B. Den Boer, “Diffie–Hellman is as strong as discrete log for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530. [7] D. Boneh, X. Boyen, and H. Shacham, “Short group signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology, 2004, pp. 41–55. [8] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Proc. Annu. Int. Conf. TheoryAppl. Cryptographic Techn.,2005, pp. 440–456. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.z
  翻译: