SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1264
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Ankita Ajay Jadhav1, Poonam Doshi(Lambhate) 2
1Department of Computer Engineering, JSCOE, Pune, Maharashtra, India, Email Id: ankitajadhav029@gmail.com
2Second PhD Scholar, Pascific University Udiapur
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data sharing among cluster memberswithin the
cloud with the characters of low maintenance and tiny
management price. Meanwhile, we tend to offer security
guarantees for the sharing information files since they're
outsourced. To owing the frequent amendment of the
membership, sharing information whereas providingprivacy-
preserving continues to be a difficult issue, particularly for an
untrusted cloud owing to the collusion attack. Moreover, for
existing schemes, the safety of key distributionispredicatedon
the secure channel, however, to own such channel may be a
sturdy assumption and is troublesome for apply. We tend to
propose a secure information sharing theme for dynamic
members. First, we tend to propose a secure manner for key
distribution with none secure communication channels, and
therefore the users will firmly obtain their non-public keys
from cluster manager. Secondly, wecandofine-grainedaccess
management; any user within the group of members will use
the supply within the cloud and revoked users not able to
access the cloud once more once they'rerevoked. Third, we are
able to shield the theme from collusion attack, which suggests
that revoked users cannot get the initial record though they
conspire with the untrusted cloud. In our approach, by
investing polynomial perform; we are able to attain a secure
user revocation theme. Finally, we can provide the non-public
key for security where the user needn’t update, hence no need
for a replacement of user joins within the cluster or a user is
revoked from the cluster.
Key Words: Anti Collusion, Privacy Preserving,
Revocation, Key Distribution, Data Confidentiality,
Access Control
1. INTRODUCTION
In Cloud Computing by consolidating an
arrangement of existing and new procedures from research
regions, for example, Service-Oriented Architectures (SOA)
and virtualization, distributedcomputingisviewedall things
considered a figuring worldview in which assets in the
processing foundation are given as administrations overthe
Internet. One test in this setting is to accomplish fine grain,
information privacy, and adaptability all the while, which is
not given by current work. In this paper, we propose a plan
to accomplish this objective by misusing KPABE and
remarkably joining it with procedures of intermediary re-
encryption and apathetic re-encryption. Besides, our
proposed plan can empower the information proprietor to
designate the majority of calculation overhead to capable
cloud servers. Classification of client get to benefitandclient
mystery key responsibility can be accomplished. A standout
amongst principal administration offered bycloudsuppliers
is information stockpiling. Give us a chance to consider
handy information.
We can give secure and protection saving access
control to clients, which will give certainity of any part in a
gathering to secretly use the cloud asset. Also, the genuine
characters of information proprietors can be uncovered by
the gathering chief when question happen. In distributed
computing, cloud servers give an endless storage room to
clients to store information [1]. It can help customers
diminish their money related yield of information
administrations by outsourcing the neighborhood
stockpiling into the cloud. Be that as it may, as we now
transfer information to the cloud, we lose the physical
control of the information stockpiling. To accomplish
security protecting, a typical approach is to utilize
cryptography information records before the customers
outsource the delicate informationtothecloud[2].Sadly,the
ordinary way is insufficient in view of our itemized
objectives, for example, fine-grained get to control. It is hard
to plan a safe and productive information sharing plan,
particularly for element individuals.
2. LITERATURE SURVEY
Ateniese et al. [1] proposed that quick and secure re-
encryption will turn out to be progressivelymainstreamasa
strategy for overseeing encoded document frameworks.
Albeit effectively processable,theacrossthe board reception
of BBS re-encryption has been frustrated by extensive
security dangers. Taking after late work of Dodis and Ivan,
we show new re-encryption plots that understand a more
grounded idea of security, and we exhibit the helpfulness of
intermediary re-encryption as a technique for addingaccess
control to a protected record framework.
Dan et al. [2] presented paper shows the testing open issue
by one hand, characterizing and authorizing access
arrangements in view of information features, and, then
again, permitting theinformationproprietortoassigna large
portion of the calculation undertakings required in fine-
grained information gettocontrol tountrustedcloudservers
without revealing the basic information substance. We
accomplish this objective by abusing and exceptionally
consolidating strategies of trait-based encryption (ABE),
intermediary re-encryption, and apathetic re-encryption.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1265
Our proposed plot likewise has striking properties of client
get to benefit classification and client mystery key
responsibility.
Liu et al. [3] In Mona, a client can impart information to
others in the gathering without uncovering character
security to the cloud. Also, Mona underpins effective client
repudiation and new client joining. All the more
uncommonly, effective client repudiation can be
accomplished through an open renouncement list without
redesigning the private keys of the rest of the clients, and
new clients can specifically decode records put away in the
cloud before their interest.
Zhu et al. [4] presented plan could address fine-grained get
to control, which implies that not just the gathering
individuals could utilize the sharing information asset
whenever additionally the new clients could utilize the
sharing information instantly after their disavowals and the
denied clients won't be permitted to utilize the sharing
information again after they are expelledfromthegathering.
Nonetheless, through our security examination, the Mona
conspire still has some security vulnerabilities. It will
effectively experience the ill effects of the intrigue assault,
which can prompt to the renounced clients getting the
sharing information and uncovering other honest to
goodness individuals' insider facts. Moreover, there is
another security lack in the client enrollment stage, which is
the way to ensure the private key while circulating it in the
unsecured correspondence channels.
3. SYSTEM MODEL
3.1 EXISTING SYSTEM
A security planning for information sharing on untrusted
servers has been proposed. In these methodologies,
information owner stores the encrypted or encoded
information records in untrusted big data and disseminate
the relating decoding secret key just to approved clients.
In this way, unapproved clients, and alsostockpilingservers,
can't take in the substance of the information documents
since they have no learning of the unscrambling keys,
However, the complexities of client support and denial in
these plans are directly expanding the quantity of
information proprietors and the quantity disavowedclients,
separately.
By setting a gathering with a solitary quality, Lu et al.
proposed a protected provenance conspire in light of the
figure content arrangement trait based encryption strategy,
which permits any individual from a gathering to impart
information to others. Be that as it may, the issue of client
renouncement is not tended to in their
plan.
Fig 1. System Model
They introduced a versatile andfine-grainedinformation get
to control plot in distributed computing in light of the key
strategy property based encryption (KP-ABE) system.
Tragically, the single proprietor way ruins the reception of
their plan into the situation where any client is allowed to
store and share information.
3.2 Proposed System
The System will keep up trustworthiness if renounce clients
can't get an entrance of shared information once they have
been disavowed. Be that as it may, this framework
experiences a crash assault by the deny client and a cloud.
the plan can accomplish fine effectiveness, which implies
past clients require not to redesign their private keys forthe
circumstance either another client participates in the
gathering or a client is renounced from the gathering. To
Achieve a Secure Anti-Collusion Data Sharing Scheme, for
element gathers in the cloud. we propose a safe information
sharing plan for element individuals. Inthefirstplace,Group
Manager wills distinctivedealswithalternategatherings and
give an endorsement for Group individuals for enrollment.
Client denial is performed by a gathering manager. Group
Member will do enrollment first then transferanddownload
operation will be performed by the gathering partasitwere.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1266
Fig 2. System Architecture Design
Hostile to plot data sharing plan for element organizations
inside the cloud, the clients can safely get their private keys
from group supervisor testaments Authorities and secure
correspondence channels. Likewise, our plan is prepared to
help dynamic companies productively, when a fresh out of
the plastic new client joins inside the workforce or a
purchaser is denied from the gathering, theclassifiedkeysof
the inverse clients don't need to be recomputed and
redesigned. In addition, our plan can harvest calm client
disavowal; the denied clients can't be prepared to get the
standard information reports when they are repudiated
despite the fact that they scheme with the untrusted cloud.
4. SYSTEM ANALYSIS
AES is based on a design principle known as a substitution-
permutation network, combination of both substitutionand
permutation, and is fast in both software and hardware.
Unlike its predecessor DES, AES does not use a Feistel
network. AES is a variant of Rijndael which has a fixed block
size of 128 bits, and a key size of 128, 192, or 256 bits. By
contrast, the Rijndael specification per se is specified with
block and key sizes that may be any multiple of 32 bits, both
with a minimum of 128 and a maximum of 256 bits.
AES operates on a 4 × 4 column-major order matrixofbytes,
termed the state, although some versions of Rijndael have a
larger block size and have additional columns in the state.
Most AES calculations are done in a special finite field.
For instance, if there are 16 bytes, b0, b1, b2….b15 , these
bytes are represented as this matrix:
The key size used for an AES cipher specifies the number of
repetitions of transformation rounds that convert the input,
called the plaintext, into the final output, called the
ciphertext. The number of cycles of repetition is as follows:
 10 cycles of repetition for 128-bit keys.
 12 cycles of repetition for 192-bit keys.
 14 cycles of repetition for 256-bit keys.
Each round consists of several processing steps, each
containing four similar but different stages, including one
that depends on the encryption key itself. A set of reverse
rounds are applied to transform ciphertext back into the
original plaintext using the same encryption key.
High-level description of the algorithm:
1. KeyExpansions—round keys are derived from the
cipher key using Rijndael's key schedule. AES requires a
separate 128-bit round key block for each round plus one
more.
2. InitialRound
1. AddRoundKey—each byte of the state is combinedwith
a block of the round key using bitwise xor.
3. Rounds
1. SubBytes—a non-linear substitution step
where each byte is replaced with another
according to a lookup table.
2. ShiftRows—a transposition stepwherethe
last three rows of the state are shifted
cyclically a certain number of steps.
3. MixColumns—a mixing operation which
operates on the columns of the state,
combining the four bytes in each column.
4. AddRoundKey
4. Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey.
5. METHOD
Anti collusion data sharing scheme in centralized system
proposes, which may achieve secure key distribution and
data sharing for dynamic group. The most contributions of
this scheme include:
1. This provides a secure method for key distribution
without any secure communicationchannels.Theusers
will securely get their privatekeysfromgroupmanager
with none Certificate Authorities because of the
verification for the general public key of the user.
2. This scheme can do fine-grained access control, with
the help of the group user list, any user within the
group will use the source within the cloud and revoked
users cannot access the cloud again when they're
revoked.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1267
3. This secure data sharing scheme which may be
protected from collusion attack. The revoked users
cannot be able to get the original data files,oncethey're
revoked even if they conspire with the untrustedcloud.
This scheme can do secure user revocation with the
help of polynomial perform.
4. This scheme is able to support dynamic teams with
efficiency, once a new user joins within the group or a
user is revoked from the group, thepersonal keysofthe
opposite users don't need to be recomputed and
updated.
6. This scheme provides a security analysis to prove
the security of our scheme. Additionally, it
conjointly performs simulations to demonstrate
the efficiency of our scheme.
We can get some benefits from this scheme, they are:
1. This scheme achieves a secure key distribution and
data sharing for dynamic group.
2. During this scheme the users will securely get their
personal keys from group manager without any
Certificate Authorities.
3. This scheme is protected from collusion attack.
4. This scheme is able to support dynamic groups with
efficiency
5. This scheme also avoids data duplication.
6. RSULT ANALYSIS
In general, this scheme can achieve secure key distribution,
fine access control, and secure user revocation. For clearly
seeing the advantages of securityofourproposedscheme,as
illustrated in graphs,welist a graphcomparedwithMona[3],
which is Liu et al.’s scheme, the RBAC[10] scheme, which is
Zhou et al.’s scheme and ODBE[9] scheme, SADC[1] and
finally our proposed scheme.
1. Comparison on computation cost of members for file
upload amongODBE,RBAC,Mona,SADCandourscheme.
2. Comparison on computation cost of members for file
download among ODBE, RBAC, Mona, SADC and our
scheme
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1268
3. Comparison on computation cost of members for file
upload among RBAC, Mona, SADC and our scheme.
4. Comparison on computation cost of the cloud for
file download among RBAC, Mona, SADC and our
scheme
3. CONCLUSIONS
The system proposes a Secure Anti-Collusion Data Sharing
Scheme, for dynamic groups in the cloud. By member group
signature and dynamicbroadcastencryptiontechniques,any
cloud user can unidentified share data with others.
Meanwhile, the storage expenses and encryption estimation
cost of our scheme are independent with the number of
officially cancelled users.Thesystemmainlyconcentrateson
the user official cancellation which should solve the
problems of efficiency and storage. In addition, we examine
the security system of our scheme with harsh proofs and
demonstrate the efficiencyof ourschemeinexpected results.
ACKNOWLEDGEMENT
It is with the profound sense of gratitude I would like to
acknowledge constant help and encouragement from guide
Prof P.D. Lambhate. Our Head of the department(Computer
Engineering) Prof H.A Hingoliwala, Post Graduate
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1269
Coordinator Prof M D Ingle and Principal Dr. M. G Jadhav
JSCOE, Hadapsar for their sterling efforts, amenable
assistance and continues guidance in all mywork.Theyhave
given in depth knowledge and enlightened me on this work.
REFERENCES
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improved proxyre-encryptionschemeswithapplicationsto
secure distributed storage,” in Proc. Netw. Distrib. Syst.
Security Symp., 2005, pp. 29–43.
[2] B. Dan and F. Matt, “Identity-based encryption from
theweil pairing in Proc. 21st Annu. Int. Cryptol. Conf. Adv
Cryptol., 2001, vol. 2139, pp. 213–229.
[3] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure
multiowner data sharing for dynamic groups in the cloud,”
IEEE Trans.
[4] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure
multiowner data sharing for dynamic groups in the cloud,”
in Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp.
185–189.
[5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “A view of cloud computing,” Commun. ACM, vol.
53, no. 4.
[6] D. Boneh, X. Boyen, and H. Shacham, “Short group
signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology,
2004, pp. 41–55.
[7] B. Waters, “Ciphertext-policyattribute-based encryption:
An expressive, efficient, and provably secure realization,” in
Proc. Int. Conf. Practice Theory Public Key Cryptography
Conf. Public Key Cryptography, 2008, pp. 53–70.
[8] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure,
scalable, and fine-grained data access control in cloud
computing,” in Proc. ACM Symp. Inf., Comput. Commun.
Security, 2010, pp. 282–292.
[9] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully
collusion secure dynamic broadcast encryption with
constant-size Ci-phertexts or decryption keys,” in Proc. 1st
Int. Conf. Pairing-Based Cryptography, 2007, pp. 39–
59(ODBE original dynamic broadcast encryption (ODBE)
scheme)
[10] L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving
secure role-based access control on encrypted data in cloud
storage,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12,
pp. 1947–1960, Dec. 2013. (RBAC)
[11] X. Zou, Y.-S. Dai, and E. Bertino, “A practical and flexible
key management mechanism for trusted collaborative
computing,” in Proc. IEEE Conf. Comput. Commun.,2008, pp.
1211–1219.
[12] M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving
policy based content sharing in public clouds,” IEEE Trans.
Know. Data Eng., vol. 25, no. 11, pp. 2602–2614, Nov. 2013.
[13] D. Dolev and A. C. Yao, “On the security of public key
protocols,” IEEE Trans. Inf. Theory, vol. IT-29, no.2,pp.198–
208, Mar. 1983.
[14] B. Den Boer, “Diffie–Hellman is as strong asdiscretelog
for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530.
[15] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity
based encryption with constant size ciphertext,” in Proc.
Annu. Int. Conf. TheoryAppl. CryptographicTechn.,2005, pp.
440–456.
[16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proc. ACM Conf. Comput. Commun.
Security, 2006, pp. 89–98.
[17] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance:
The essential of bread and butter of data forensics in cloud
computing,” in Proc. ACM Symp. Inf., Comput. Commun.
Security, 2010, pp. 282–292.
[18] A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int’l
Cryptology Conf. AdvancesinCryptology(CRYPTO),pp. 480-
491, 1993
[19] B. Sheng and Q. Li, “Verifiable Privacy-PreservingRange
Query in Two-Tiered Sensor Networks,” Proc. IEEE
INFOCOM, pp. 4650, 2008.
[20] D. Boneh, B. Lynn, and H. Shacham, “Short Signature
from the Weil Pairing,” Proc. Int’l Conf. Theory and
Application of Cryptology and Information Security:
Advances in Cryptology, pp. 514-532, 2001.
BIOGRAPHIES
Miss. Ankita Ajay Jadhav
Student in Department of Computer
Engineering, Jayawantrao Sawant
College of Engineering, Pune, Mah,
India. She pursued her BE (Comp)
from Pune University, Mah, India in
2012 and Pursuing ME (Comp)
from Jayawantrao Sawant Collegeof
Engineering, Pune, Mah, India. Her
research interests include Cloud
Computing Security.

Contenu connexe

Tendances

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET Journal
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET Journal
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 

Tendances (20)

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
H1803035056
H1803035056H1803035056
H1803035056
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
 
IRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data ProximityIRJET- Security Safe Guarding Location Data Proximity
IRJET- Security Safe Guarding Location Data Proximity
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 

Similaire à Anti Collusion Data Sharing Schema for Centralized Group in Cloud

A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 

Similaire à Anti Collusion Data Sharing Schema for Centralized Group in Cloud (20)

A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Dernier (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Anti Collusion Data Sharing Schema for Centralized Group in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1264 Anti Collusion Data Sharing Schema for Centralized Group in Cloud Ankita Ajay Jadhav1, Poonam Doshi(Lambhate) 2 1Department of Computer Engineering, JSCOE, Pune, Maharashtra, India, Email Id: ankitajadhav029@gmail.com 2Second PhD Scholar, Pascific University Udiapur ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data sharing among cluster memberswithin the cloud with the characters of low maintenance and tiny management price. Meanwhile, we tend to offer security guarantees for the sharing information files since they're outsourced. To owing the frequent amendment of the membership, sharing information whereas providingprivacy- preserving continues to be a difficult issue, particularly for an untrusted cloud owing to the collusion attack. Moreover, for existing schemes, the safety of key distributionispredicatedon the secure channel, however, to own such channel may be a sturdy assumption and is troublesome for apply. We tend to propose a secure information sharing theme for dynamic members. First, we tend to propose a secure manner for key distribution with none secure communication channels, and therefore the users will firmly obtain their non-public keys from cluster manager. Secondly, wecandofine-grainedaccess management; any user within the group of members will use the supply within the cloud and revoked users not able to access the cloud once more once they'rerevoked. Third, we are able to shield the theme from collusion attack, which suggests that revoked users cannot get the initial record though they conspire with the untrusted cloud. In our approach, by investing polynomial perform; we are able to attain a secure user revocation theme. Finally, we can provide the non-public key for security where the user needn’t update, hence no need for a replacement of user joins within the cluster or a user is revoked from the cluster. Key Words: Anti Collusion, Privacy Preserving, Revocation, Key Distribution, Data Confidentiality, Access Control 1. INTRODUCTION In Cloud Computing by consolidating an arrangement of existing and new procedures from research regions, for example, Service-Oriented Architectures (SOA) and virtualization, distributedcomputingisviewedall things considered a figuring worldview in which assets in the processing foundation are given as administrations overthe Internet. One test in this setting is to accomplish fine grain, information privacy, and adaptability all the while, which is not given by current work. In this paper, we propose a plan to accomplish this objective by misusing KPABE and remarkably joining it with procedures of intermediary re- encryption and apathetic re-encryption. Besides, our proposed plan can empower the information proprietor to designate the majority of calculation overhead to capable cloud servers. Classification of client get to benefitandclient mystery key responsibility can be accomplished. A standout amongst principal administration offered bycloudsuppliers is information stockpiling. Give us a chance to consider handy information. We can give secure and protection saving access control to clients, which will give certainity of any part in a gathering to secretly use the cloud asset. Also, the genuine characters of information proprietors can be uncovered by the gathering chief when question happen. In distributed computing, cloud servers give an endless storage room to clients to store information [1]. It can help customers diminish their money related yield of information administrations by outsourcing the neighborhood stockpiling into the cloud. Be that as it may, as we now transfer information to the cloud, we lose the physical control of the information stockpiling. To accomplish security protecting, a typical approach is to utilize cryptography information records before the customers outsource the delicate informationtothecloud[2].Sadly,the ordinary way is insufficient in view of our itemized objectives, for example, fine-grained get to control. It is hard to plan a safe and productive information sharing plan, particularly for element individuals. 2. LITERATURE SURVEY Ateniese et al. [1] proposed that quick and secure re- encryption will turn out to be progressivelymainstreamasa strategy for overseeing encoded document frameworks. Albeit effectively processable,theacrossthe board reception of BBS re-encryption has been frustrated by extensive security dangers. Taking after late work of Dodis and Ivan, we show new re-encryption plots that understand a more grounded idea of security, and we exhibit the helpfulness of intermediary re-encryption as a technique for addingaccess control to a protected record framework. Dan et al. [2] presented paper shows the testing open issue by one hand, characterizing and authorizing access arrangements in view of information features, and, then again, permitting theinformationproprietortoassigna large portion of the calculation undertakings required in fine- grained information gettocontrol tountrustedcloudservers without revealing the basic information substance. We accomplish this objective by abusing and exceptionally consolidating strategies of trait-based encryption (ABE), intermediary re-encryption, and apathetic re-encryption.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1265 Our proposed plot likewise has striking properties of client get to benefit classification and client mystery key responsibility. Liu et al. [3] In Mona, a client can impart information to others in the gathering without uncovering character security to the cloud. Also, Mona underpins effective client repudiation and new client joining. All the more uncommonly, effective client repudiation can be accomplished through an open renouncement list without redesigning the private keys of the rest of the clients, and new clients can specifically decode records put away in the cloud before their interest. Zhu et al. [4] presented plan could address fine-grained get to control, which implies that not just the gathering individuals could utilize the sharing information asset whenever additionally the new clients could utilize the sharing information instantly after their disavowals and the denied clients won't be permitted to utilize the sharing information again after they are expelledfromthegathering. Nonetheless, through our security examination, the Mona conspire still has some security vulnerabilities. It will effectively experience the ill effects of the intrigue assault, which can prompt to the renounced clients getting the sharing information and uncovering other honest to goodness individuals' insider facts. Moreover, there is another security lack in the client enrollment stage, which is the way to ensure the private key while circulating it in the unsecured correspondence channels. 3. SYSTEM MODEL 3.1 EXISTING SYSTEM A security planning for information sharing on untrusted servers has been proposed. In these methodologies, information owner stores the encrypted or encoded information records in untrusted big data and disseminate the relating decoding secret key just to approved clients. In this way, unapproved clients, and alsostockpilingservers, can't take in the substance of the information documents since they have no learning of the unscrambling keys, However, the complexities of client support and denial in these plans are directly expanding the quantity of information proprietors and the quantity disavowedclients, separately. By setting a gathering with a solitary quality, Lu et al. proposed a protected provenance conspire in light of the figure content arrangement trait based encryption strategy, which permits any individual from a gathering to impart information to others. Be that as it may, the issue of client renouncement is not tended to in their plan. Fig 1. System Model They introduced a versatile andfine-grainedinformation get to control plot in distributed computing in light of the key strategy property based encryption (KP-ABE) system. Tragically, the single proprietor way ruins the reception of their plan into the situation where any client is allowed to store and share information. 3.2 Proposed System The System will keep up trustworthiness if renounce clients can't get an entrance of shared information once they have been disavowed. Be that as it may, this framework experiences a crash assault by the deny client and a cloud. the plan can accomplish fine effectiveness, which implies past clients require not to redesign their private keys forthe circumstance either another client participates in the gathering or a client is renounced from the gathering. To Achieve a Secure Anti-Collusion Data Sharing Scheme, for element gathers in the cloud. we propose a safe information sharing plan for element individuals. Inthefirstplace,Group Manager wills distinctivedealswithalternategatherings and give an endorsement for Group individuals for enrollment. Client denial is performed by a gathering manager. Group Member will do enrollment first then transferanddownload operation will be performed by the gathering partasitwere.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1266 Fig 2. System Architecture Design Hostile to plot data sharing plan for element organizations inside the cloud, the clients can safely get their private keys from group supervisor testaments Authorities and secure correspondence channels. Likewise, our plan is prepared to help dynamic companies productively, when a fresh out of the plastic new client joins inside the workforce or a purchaser is denied from the gathering, theclassifiedkeysof the inverse clients don't need to be recomputed and redesigned. In addition, our plan can harvest calm client disavowal; the denied clients can't be prepared to get the standard information reports when they are repudiated despite the fact that they scheme with the untrusted cloud. 4. SYSTEM ANALYSIS AES is based on a design principle known as a substitution- permutation network, combination of both substitutionand permutation, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits. AES operates on a 4 × 4 column-major order matrixofbytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are done in a special finite field. For instance, if there are 16 bytes, b0, b1, b2….b15 , these bytes are represented as this matrix: The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of repetition is as follows:  10 cycles of repetition for 128-bit keys.  12 cycles of repetition for 192-bit keys.  14 cycles of repetition for 256-bit keys. Each round consists of several processing steps, each containing four similar but different stages, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. High-level description of the algorithm: 1. KeyExpansions—round keys are derived from the cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more. 2. InitialRound 1. AddRoundKey—each byte of the state is combinedwith a block of the round key using bitwise xor. 3. Rounds 1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. ShiftRows—a transposition stepwherethe last three rows of the state are shifted cyclically a certain number of steps. 3. MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. 4. AddRoundKey 4. Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey. 5. METHOD Anti collusion data sharing scheme in centralized system proposes, which may achieve secure key distribution and data sharing for dynamic group. The most contributions of this scheme include: 1. This provides a secure method for key distribution without any secure communicationchannels.Theusers will securely get their privatekeysfromgroupmanager with none Certificate Authorities because of the verification for the general public key of the user. 2. This scheme can do fine-grained access control, with the help of the group user list, any user within the group will use the source within the cloud and revoked users cannot access the cloud again when they're revoked.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1267 3. This secure data sharing scheme which may be protected from collusion attack. The revoked users cannot be able to get the original data files,oncethey're revoked even if they conspire with the untrustedcloud. This scheme can do secure user revocation with the help of polynomial perform. 4. This scheme is able to support dynamic teams with efficiency, once a new user joins within the group or a user is revoked from the group, thepersonal keysofthe opposite users don't need to be recomputed and updated. 6. This scheme provides a security analysis to prove the security of our scheme. Additionally, it conjointly performs simulations to demonstrate the efficiency of our scheme. We can get some benefits from this scheme, they are: 1. This scheme achieves a secure key distribution and data sharing for dynamic group. 2. During this scheme the users will securely get their personal keys from group manager without any Certificate Authorities. 3. This scheme is protected from collusion attack. 4. This scheme is able to support dynamic groups with efficiency 5. This scheme also avoids data duplication. 6. RSULT ANALYSIS In general, this scheme can achieve secure key distribution, fine access control, and secure user revocation. For clearly seeing the advantages of securityofourproposedscheme,as illustrated in graphs,welist a graphcomparedwithMona[3], which is Liu et al.’s scheme, the RBAC[10] scheme, which is Zhou et al.’s scheme and ODBE[9] scheme, SADC[1] and finally our proposed scheme. 1. Comparison on computation cost of members for file upload amongODBE,RBAC,Mona,SADCandourscheme. 2. Comparison on computation cost of members for file download among ODBE, RBAC, Mona, SADC and our scheme
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1268 3. Comparison on computation cost of members for file upload among RBAC, Mona, SADC and our scheme. 4. Comparison on computation cost of the cloud for file download among RBAC, Mona, SADC and our scheme 3. CONCLUSIONS The system proposes a Secure Anti-Collusion Data Sharing Scheme, for dynamic groups in the cloud. By member group signature and dynamicbroadcastencryptiontechniques,any cloud user can unidentified share data with others. Meanwhile, the storage expenses and encryption estimation cost of our scheme are independent with the number of officially cancelled users.Thesystemmainlyconcentrateson the user official cancellation which should solve the problems of efficiency and storage. In addition, we examine the security system of our scheme with harsh proofs and demonstrate the efficiencyof ourschemeinexpected results. ACKNOWLEDGEMENT It is with the profound sense of gratitude I would like to acknowledge constant help and encouragement from guide Prof P.D. Lambhate. Our Head of the department(Computer Engineering) Prof H.A Hingoliwala, Post Graduate
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1269 Coordinator Prof M D Ingle and Principal Dr. M. G Jadhav JSCOE, Hadapsar for their sterling efforts, amenable assistance and continues guidance in all mywork.Theyhave given in depth knowledge and enlightened me on this work. REFERENCES [1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxyre-encryptionschemeswithapplicationsto secure distributed storage,” in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 29–43. [2] B. Dan and F. Matt, “Identity-based encryption from theweil pairing in Proc. 21st Annu. Int. Cryptol. Conf. Adv Cryptol., 2001, vol. 2139, pp. 213–229. [3] X. Liu, Y. Zhang, B. Wang, and J. Yang, “Mona: Secure multiowner data sharing for dynamic groups in the cloud,” IEEE Trans. [4] Z. Zhu, Z. Jiang, and R. Jiang, “The attack on mona: Secure multiowner data sharing for dynamic groups in the cloud,” in Proc. Int. Conf. Inf. Sci. Cloud Comput., Dec. 7, 2013, pp. 185–189. [5] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4. [6] D. Boneh, X. Boyen, and H. Shacham, “Short group signature,” in Proc. Int. Cryptology Conf. Adv. Cryptology, 2004, pp. 41–55. [7] B. Waters, “Ciphertext-policyattribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. Int. Conf. Practice Theory Public Key Cryptography Conf. Public Key Cryptography, 2008, pp. 53–70. [8] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [9] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully collusion secure dynamic broadcast encryption with constant-size Ci-phertexts or decryption keys,” in Proc. 1st Int. Conf. Pairing-Based Cryptography, 2007, pp. 39– 59(ODBE original dynamic broadcast encryption (ODBE) scheme) [10] L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving secure role-based access control on encrypted data in cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947–1960, Dec. 2013. (RBAC) [11] X. Zou, Y.-S. Dai, and E. Bertino, “A practical and flexible key management mechanism for trusted collaborative computing,” in Proc. IEEE Conf. Comput. Commun.,2008, pp. 1211–1219. [12] M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policy based content sharing in public clouds,” IEEE Trans. Know. Data Eng., vol. 25, no. 11, pp. 2602–2614, Nov. 2013. [13] D. Dolev and A. C. Yao, “On the security of public key protocols,” IEEE Trans. Inf. Theory, vol. IT-29, no.2,pp.198– 208, Mar. 1983. [14] B. Den Boer, “Diffie–Hellman is as strong asdiscretelog for certain primes,” in Proc. Adv. Cryptol., 1988, p. 530. [15] D. Boneh, X. Boyen, and E. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Proc. Annu. Int. Conf. TheoryAppl. CryptographicTechn.,2005, pp. 440–456. [16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98. [17] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure provenance: The essential of bread and butter of data forensics in cloud computing,” in Proc. ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 282–292. [18] A. Fiat and M. Naor, “Broadcast Encryption,” Proc. Int’l Cryptology Conf. AdvancesinCryptology(CRYPTO),pp. 480- 491, 1993 [19] B. Sheng and Q. Li, “Verifiable Privacy-PreservingRange Query in Two-Tiered Sensor Networks,” Proc. IEEE INFOCOM, pp. 4650, 2008. [20] D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 514-532, 2001. BIOGRAPHIES Miss. Ankita Ajay Jadhav Student in Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune, Mah, India. She pursued her BE (Comp) from Pune University, Mah, India in 2012 and Pursuing ME (Comp) from Jayawantrao Sawant Collegeof Engineering, Pune, Mah, India. Her research interests include Cloud Computing Security.