An Improved Signature Schema for user Authentication and Privacy of Shared Data for Dynamic Groups in Cloud

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2017 by IJCOT Journal
Volume - 8 Issue - 2
Year of Publication : 2018
Authors :  Suri Nilima, G. Sivalakshmi

Citation

Suri Nilima, G. Sivalakshmi"An Improved Signature Schema for user Authentication and Privacy of Shared Data for Dynamic Groups in Cloud", International Journal of Computer & organization Trends (IJCOT), V8(2):39-44 March - April  2018, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

Now a days cloud computing provides more attractive features like scalability, low cost, flexibility and easy start for the beginners. By implementing cloud architecture it provides more security of shared data and information in the cloud. The sharing of data throughout group members to preserves data and also provides privacy from untrusted users. By providing privacy from untrusted users, it will also grants access of data from the cloud to group members. Before giving access permission of each group member, the group key manager will perform the authentication process of each group member. After completion of authentication process the group manager will generate secret key for all group members and send to all group members. Each group member will get secret key and perform the encryption process. After completion of encryption process the group member will stored the cipher format data into cloud. If any group member wants that particular file it will check access permission of group members and give the permission for download the file. In this paper we are implementing the Prime order Acknowledgment protocol for user’s verification process and also get same secret key of all users. After completion of authentication and key generation process it will encrypt the shared data by using byte shuffle encryption algorithm. By implementing those concepts we can provide scalability and also provide more flexibility of shared data in cloud.

References

[1]. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
[2]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[3] Varun and Vamsee Mohan.B,” An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 730-734
[4]. Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[5]. Zhongma Zhu and Rui Jiang, “A secure anti-collusion data sharing scheme for dynamic groups in the cloud”, IEEE Transactions on parallel and distributed systems, vol.27, no.1, January 2016
[6]. Yong CHENG, Jun MA and Zhi-ying “Efficient revocation in cipertext-policy attribute-based encryption based cryptographic cloud storage” Zhejiang University and Springer-Verlag Berlin 2011
[7]. Zhongma Zhu and Rui Jiang,” A Secure Anti- Collusion Data Sharing Scheme for Dynamic Groups in the Cloud”, IEEE Transactions on Parallel and Distributed Systems DOI:10.1109/TPDS.2015.2388446.
[8]. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[9]. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud”, IEEE Transactions On Parallel and Distributed Systems, Vol.24, No. 6, June 2013.
[10] B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” Proc.Int’lConf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.

Keywords
Signature, Authentication, Cryptography, Dynamic Groups, Cloud Computing