Secured Multi Owner Data Sharing in Cloud Using AES Algorithm
DOI:
https://doi.org/10.61841/dtr5m796Keywords:
Cloud Computing, Data Sharing, Advances Encryption Standard(AES), Key Distribution, Encryption, Group CreationAbstract
Cloud Computing enables us to easily store data and simply share data with others. Due to the safety threats in any cloud, users take measures to secure their data, such as signatures, on their data to protect the integrity. With the advent of cloud computing, it becomes increasingly popular for the data owners while allowing the data users to retrieve these data. For privacy concerns, over encrypted cloud data, several researches under the single owner model have been done. However, most cloud servers which are in practice do not just serve one owner, instead, they support multiple owners to share the benefits brought by the servers. In our project we proposed a multiple owner file sharing system in cloud computing, here the user can use their particular owner file and also he can access other owner files. For accessing, the way of request and response is used. If another owner responds the user, it means that he can get the private key from the owner and then he can access the files.
Downloads
References
1. D. X. Song, D. A. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, 2000, pp. 44–55.
2. E. Goh, “Securing indexes,” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.
3. Y. Chang and M. Mitzenmacher, “Privacy preservation of the keywords searching on remotely encrypted data,” in Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, 2005, pp. 442–455.
4. R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.
5. K. Kurosawa and Y. Ohtaki, “Uc-secure searchable symmetric encryption,” in Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, 2012, pp. 285–298.
6. ——, “How to update documents verifiably in a searchable symmetric encryption format,” in Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, 2013, pp. 309–328.
7. D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Ros¸u, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for boolean queries,” in Advances in Cryptology–CRYPTO 2013, 2013,
pp. 353–373.
8. S. R Lenka and B. Nayak, “Enhancement of the Data Security in Cloud Computing using RSA Encryption and MDS algorithm, “ vol. 2, no. 3, pp. 60-64, 2014.
9. C. Bosch, Q. Tang, P. H. Hartel, and W. Jonker, “Selective document ¨ retrieval from encrypted database.” in ISC, 2012, pp. 224–241
10. E. Thambiraja, “A Survey on most common encryption Techniques,” vol. 2 no. 7, pp. 226-233,2012.
11. S. R Masadeh, S. Aljawameh, and N. Turab, “ A comparision of Data Encryption Algorithms with the proposed algorithm: Wireless Security,” pp. 2-6.
12. R. Kaur , “Effective Symmetric key Block Ciphers Technique for Data Security :RUNDAEL,” vol. 3, no. 7,
pp. 2005-2008, 2014.
13. P. Kalpana , “ Data Security in cloud computing using RSA algorithm ,” vol. 1, no. 4, pp.143-146, 2012.
14. Yasar, Mustafa, and . 2019. The remember regeneration therapy method: An overview of new therapy protocol to approach diseases. Journal of Complementary Medicine Research, 10 (1), 68-
80. doi:10.5455/jcmr.20181229122909
15. Yang, G., Hamacher, J., Gorshkov, B., White, R., Sridhar, S., Verin, A., Chakraborty, T., Lucas, R.The dual role of TNF in pulmonary edema(2010) Journal of Cardiovascular Disease Research, 1 (1), pp. 29-36. DOI: 10.4103/0975-3583.59983
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
