Secured Multi Owner Data Sharing in Cloud Using AES Algorithm

Authors

  • N. Praveen Department of Computer Science, SRM Institute of Science and Technology, Chennai, India Author
  • P. Satya Sai Manohar Department of Computer Science, SRM Institute of Science and Technology, Chennai, India, Author
  • M. V. Praveen Kumar Department of Computer Science, SRM Institute of Science and Technology, Chennai, India Author

DOI:

https://doi.org/10.61841/dtr5m796

Keywords:

Cloud Computing, Data Sharing, Advances Encryption Standard(AES), Key Distribution, Encryption, Group Creation

Abstract

Cloud Computing enables us to easily store data and simply share data with others. Due to the safety threats in any cloud, users take measures to secure their data, such as signatures, on their data to protect the integrity. With the advent of cloud computing, it becomes increasingly popular for the data owners while allowing the data users to retrieve these data. For privacy concerns, over encrypted cloud data, several researches under the single owner model have been done. However, most cloud servers which are in practice do not just serve one owner, instead, they support multiple owners to share the benefits brought by the servers. In our project we proposed a multiple owner file sharing system in cloud computing, here the user can use their particular owner file and also he can access other owner files. For accessing, the way of request and response is used. If another owner responds the user, it means that he can get the private key from the owner and then he can access the files.



Downloads

Download data is not yet available.

References

1. D. X. Song, D. A. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, 2000, pp. 44–55.

2. E. Goh, “Securing indexes,” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003.

3. Y. Chang and M. Mitzenmacher, “Privacy preservation of the keywords searching on remotely encrypted data,” in Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, 2005, pp. 442–455.

4. R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” Journal of Computer Security, vol. 19, no. 5, pp. 895–934, 2011.

5. K. Kurosawa and Y. Ohtaki, “Uc-secure searchable symmetric encryption,” in Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, 2012, pp. 285–298.

6. ——, “How to update documents verifiably in a searchable symmetric encryption format,” in Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, 2013, pp. 309–328.

7. D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Ros¸u, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for boolean queries,” in Advances in Cryptology–CRYPTO 2013, 2013,

pp. 353–373.

8. S. R Lenka and B. Nayak, “Enhancement of the Data Security in Cloud Computing using RSA Encryption and MDS algorithm, “ vol. 2, no. 3, pp. 60-64, 2014.

9. C. Bosch, Q. Tang, P. H. Hartel, and W. Jonker, “Selective document ¨ retrieval from encrypted database.” in ISC, 2012, pp. 224–241

10. E. Thambiraja, “A Survey on most common encryption Techniques,” vol. 2 no. 7, pp. 226-233,2012.

11. S. R Masadeh, S. Aljawameh, and N. Turab, “ A comparision of Data Encryption Algorithms with the proposed algorithm: Wireless Security,” pp. 2-6.

12. R. Kaur , “Effective Symmetric key Block Ciphers Technique for Data Security :RUNDAEL,” vol. 3, no. 7,

pp. 2005-2008, 2014.

13. P. Kalpana , “ Data Security in cloud computing using RSA algorithm ,” vol. 1, no. 4, pp.143-146, 2012.

14. Yasar, Mustafa, and . 2019. The remember regeneration therapy method: An overview of new therapy protocol to approach diseases. Journal of Complementary Medicine Research, 10 (1), 68-

80. doi:10.5455/jcmr.20181229122909

15. Yang, G., Hamacher, J., Gorshkov, B., White, R., Sridhar, S., Verin, A., Chakraborty, T., Lucas, R.The dual role of TNF in pulmonary edema(2010) Journal of Cardiovascular Disease Research, 1 (1), pp. 29-36. DOI: 10.4103/0975-3583.59983

Downloads

Published

31.10.2020

How to Cite

Praveen, N., Manohar, P. S. S., & Kumar, M. V. P. (2020). Secured Multi Owner Data Sharing in Cloud Using AES Algorithm. International Journal of Psychosocial Rehabilitation, 24(8), 1063-1070. https://doi.org/10.61841/dtr5m796