Group Data Sharing in Cloud Computing with Secure Key Agreement Modal
Keywords:
Group Data Sharing, Cloud ComputingAbstract
Cloud computing is said to be the service-oriented computing technology, which are affordable and flexible over the internet. In past few years the cloud has become more matured and provided many services, one of the primary services is data sharing in Group, where the data can be easily shared from one member to another. However, while sharing the data security is one of the primary concerns. In past several methodologies has been proposed. However, these methods lacked from the feasibility. Hence, in this paper we have proposed methodology is based on the selection scheme. Here General Group Key is generated and moreover General Key agreement protocol is decentralized based model where the data are controlled by the owner within the same group. Moreover, the proposed methodology is evaluated by analyzing the comparative analysis based on the various number of parameters. Result Analysis suggests that our methodology simply outperforms the existing one. A key agreement protocol is used to generate a common conference key for multiple participants to ensure the security of their later communications, and this protocol can be applied in cloud computing to support secure and efficient data sharing. We proposed a block design based key agreement protocol in which, TPA find malicious user from group and remove from group we have a tendency to gift general formulas for generating the common conference key K for multiple participants. Note that by taking advantage of the (v; k + 1; 1)-block design, the computational complexity of the planned Protocol linearly will increase with the quantity of participants and also the communication quality is greatly reduced. Additionally, the fault tolerance property of our protocol allows the group data sharing in cloud computing to face up to different key attacks that are analogous to Yi’s protocol.
References
- F. Chen, T. Xiang, Y. Yang, and S. S. M. Chow, “Secure cloud storage meets with secure network coding,” in IEEE INFOCOM, 2014, pp. 673–681.
- J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, “An efficient rfidauthentication protocol providing strong privacy and security,”Journal of Internet Technology, vol. 17, no. 3, p. 2, 2016.
- L. Zhou, V. Varadharajan, and M. Hitchens, “Cryptographic rolebasedaccess control for secure cloud data storage systems,” InformationForensics and Security IEEE Transactions on, vol. 10, no. 11,pp. 2381–2395, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.