SDBE-MOG: Secure Dynamic Bits Encryption for Multi Owner Group Data Sharing in Cloud

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing is considered as the cost-efficient and practical resolution for group data sharing within the cloud group members. Unluckily, distributing data in a multi- owner way and defending data with unique privacy in cloud is a challenging issue because of the repeated change or deletion of the members. The proposed multi-owner group management system uses novel scheme GCAURDL-FBS( Group Creation, Add Member, Revocation, Deletion, Login with Forward & Backward Secrecy) to control overall group management. GCAURDL-FBS using SDBAES (Secure Dynamic Bits Advance Encryption Standard) secures the group data sharing. The major objectives of this research is 1) data security, 2) data integrity, 3) data sharing without using secret key re-computation / re-encryption, 4) forward and backward secrecy, 5) proper group owner / member revocation and 6) avoiding collusion attack, brute force attack and Structured Query Language Injection attack. Any member in group can confidently impart their information through entrusted server. Owner / Member revocation is achieved by a novel scheme; it is not necessary to compute/alter the secret keys of other members. The proposed scheme supports data integrity and efficient group member/owner revocation. Ultimately, it is found that, proposed scheme is also secure, scalable and efficient in relative to the relevant schemes. This is revealed in the security and tentative analysis



  • Keywords

    SDBAES, Group Signature, Data Integrity, Data Sharing, Forward & Backward Secrecy, Group Owner / Member Revocation.

  • References

      [1] S. Akanksha, and Patil “A Secure Multiowner Dynamic Groups Data Sharing In Cloud”, International Journal of Advances in Engineering & Technology, 9(1), 32. 2016.

      [2] Ali. M. Dhamotharan, R. Khan, E. Khan, S. U. Vasilakos, A. V. Li, K, and A. Y. Zomaya, SeDaSC: secure data sharing clouds. IEEE Systems Journal, 2015.

      [3] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. of IEEE CLOUD 2012, Hawaii, USA, pp. 295–302, Jun. 2012.

      [4] B. Wang, L. Baochun, and L. Hui, “Public auditing for shared data with efficient member revocation in the cloud,” in Proc. Of IEEE INFOCOM 2013, Turin, Italy, pp. 2904–2912, Apr. 2013.

      [5] K. S. Babu, and J. Mahalakshmi, “Group Member Revocation And Integrity Auditing Of Shared Data In Cloud Environment,” IJITR, 4(4), 3237-3240, 2016.

      [6] M. A. Chitra, , P. Prince, and V. V. Varthan, “Access Control based Dynamic Groups to overcome Collusion Attacks in Cloud”,

      [7] B. Cui, Z. Liu, and L. Wang, “Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage”, IEEE Transactions on computers, 65(8), 2374-2385, 2016.

      [8] Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil pairing,” in Proc. of Asiacrypt 2001, Gold Coast, Australia, Dec. 2001, pp. 514–532.

      [9] J. Hur, D. Koo, Y. Shin, and K. Kang,” Secure data deduplication with dynamic ownership management in cloud storage”, IEEE Transactions on Knowledge and Data Engineering, 28(11), 3113-3125, 2016.

      [10] J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-member modification,” in Proc. of IEEE INFOCOM 2014, Toronto, Canada, Apr. 2014, pp. 2121–2129.

      [11] Jiang, Tao, Xiaofeng Chen, and Jianfeng Ma. "Public integrity auditing for shared dynamic cloud data with group member revocation." IEEE Transactions on Computers 65.8 (2016): 2363-2373.

      [12] D. S Kasunde, and A. A. Manjrekar, “ Verification of multi-owner shared data with collusion resistant member revocation in cloud”, In Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 182-185, 2016.

      [13] M. Kavya, and M. J Reddy, “ Privacy Preserving Data Sharing in Multi Groups”.

      [14] K. Kowsalya, and V. Ramesh, “Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud”, International Journal of Advanced Networking and Applications, 7(5), 2899, 2016.

      [15] N. Singh, A. Jangra,U. Lakhina, and R. Sharma, “SQL Injection Attack Detection & Prevention over Cloud Services” International Journal of Computer Science and Information Security, 14(4), 256, 2016

      [16] W. Patterson, “Mathematical cryptology for computer scientists and mathematicians,”, Rowman & Littlefield, 1987.




Article ID: 23206
DOI: 10.14419/ijet.v7i4.19.23206

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.