SECURE DATA SHARING WITH IN GROUPS IN THE CLOUD
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 8
Abstract
Cloud computing refers to the delivery of computing resources over the Internet. Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. It provides high level of scalability, reliability and efficiency. In this paper we propose a secure data sharing scheme within the groups and how encryption techniques help the groups in sharing the data dynamically. Sharing of data between dynamic groups the storage overhead and encryption computation cost changes based on revoked users. So to avoid, this we are providing three level of security mechanism for individual members in a group with the help of encryption techniques to share data. In this technique data can be uploaded in to the server after the encryption of the content by the secret group key. When a new member is added to the group, this user can be granted access to the file wherein he can directly download the decrypted data file, without contacting the data owners but when they are downloading the file a secret key is generated and sent to their own mobile number, using that key user can download the data. Due to this mechanism data in the cloud is secured.
Authors and Affiliations
Gouthami Velakanti*
STUDY AND ANALYSIS OF ROLLER CONVEYOR IN MATERIAL HANDLING
In industries, it is very necessary to move the components from one area to the other in a regular basis making it desirable to minimize the workers involved in it. In this work we have designed a conveyor which c...
HYBRID APPROACHES FEATURE SUBSET SELECTION: A REVIEW
To overcome the weakness of filter and wrapper approaches, many researchers combined both the methods together. The hybrid approaches are intended to be computationally more effective than wrapper approach as well as yi...
Analysis, Design and Simulation of 12v/24v Boost Switching Converter
The objective of this paper is to analyze, design and simulate the Boost (step-up) switching converter which is one of the main parts of solar electric system. The converter performance such as load voltage, curre...
A SURVEY ON EMAIL BASED TRUST MANAGEMENT SYSTEM
Spoofing is a very common security threat to email applications. Several powerful techniques have been developed to counteract spoofing, but most of them are server-oriented and transparent to the user. Making up...
FAULT ANALYSIS ON TRANSMISSION LINES USING ARTIFICIAL NEURAL NETWORK
The transmission line among the other electrical power technique component suffers from unexpected failure due to various random causes. The transmission line is quite large as it is open in the environment. The fault o...