UGC APPROVED ISSN 2278-1412

Archive

  Volume 13 | Issue 10

  Volume 13 | Issue 9

  Volume 13 | Issue 8

  Volume 13 | Issue 7

  Volume 13 | Issue 6

  Volume 13 | Issue 5

  Volume 13 | Issue 3

  Volume 13 | Issue 1

  Volume 12 | Issue 12

  Volume 12 | Issue 11

  Volume 12 | Issue 10

  Volume 12 | Issue 9

  Volume 12 | Issue 8

  Volume 12 | Issue 7

  Volume 12 | Issue 6

  Volume 12 | Issue 5

  Volume 12 | Issue 4

  Volume 12 | Issue 3

  Volume 12 | Issue 2

  Volume 12 | Issue 1

  Volume 11 | Issue 12

  Volume 11 | Issue 11

  Volume 11 | Issue 10

  Volume 11 | Issue 8

  Volume 11 | Issue 7

  Volume 11 | Issue 6

  Volume 11 | Issue 3

  Volume 11 | Issue 1

  Volume 10 | Issue 12

  Volume 10 | Issue 8

  Volume 10 | Issue 6

  Volume 10 | Issue 3

  Volume 10 | Issue 2

  Volume 10 | Issue 1

  Volume 9 | Issue 10

  Volume 8 | Issue 11

  Volume 8 | Issue 7

  Volume 7 | Issue 8

  Volume 7 | Issue 7

  Volume 7 | Issue 6

  Volume 7 | Issue 5

  Volume 7 | Issue 4

  Volume 7 | Issue 3

  Volume 7 | Issue 2

  Volume 7 | Issue 1

  Volume 6 | Issue 12

  Volume 6 | Issue 10

  Volume 6 | Issue 9

  Volume 6 | Issue 8

  Volume 6 | Issue 7

  Volume 6 | Issue 6

  Volume 6 | Issue 5

  Volume 6 | Issue 4

  Volume 6 | Issue 3

  Volume 6 | Issue 2

  Volume 6 | Issue 1

  Volume 5 | Issue 12

  Volume 5 | Issue 11

  Volume 5 | Issue 10

  Volume 5 | Issue 9

  Volume 5 | Issue 8

  Volume 5 | Issue 7

  Volume 5 | Issue 6

  Volume 5 | Issue 5

  Volume 5 | Issue 4

  Volume 5 | Issue 3

  Volume 5 | Issue 2

  Volume 5 | Issue 1

  Volume 4 | Issue 12

  Volume 4 | Issue 10

  Volume 4 | Issue 8

  Volume 4 | Issue 7

  Volume 4 | Issue 6

  Volume 4 | Issue 5

  Volume 4 | Issue 4

  Volume 4 | Issue 2

  Volume 4 | Issue 1

  Volume 3 | Issue 10

  Volume 3 | Issue 8

  Volume 3 | Issue 6

  Volume 3 | Issue 5

  Volume 3 | Issue 4

  Volume 3 | Issue 3

  Volume 3 | Issue 2

  Volume 3 | Issue 1

  Volume 2 | Issue 12

  Volume 2 | Issue 11

  Volume 2 | Issue 10

  Volume 2 | Issue 9

  Volume 2 | Issue 8

  Volume 2 | Issue 7

  Volume 2 | Issue 2

  Volume 1 | Issue 9

  Volume 1 | Issue 8

  Volume 1 | Issue 7

  Volume 1 | Issue 6

  Volume 1 | Issue 4

  Volume 1 | Issue 3

  Volume 1 | Issue 2

  Volume 1 | Issue 1

Current Volume 13 | Issue 11

A Review on Secure Anti-Collusion Data Sharing Scheme forDynamic Groups in the Cloud


Volume:  5 - Issue: 02 - Date: 01-02-2016
Approved ISSN:  2278-1412
Published Id:  IJAECESTU260 |  Page No.: 906-909
Author: Pinky Mehra
Co- Author: Vimal Shukla
Abstract:-Benefit since cloud computing, users can get an effective and cheap approach for information allocation between group members within the cloud with the characters of low maintenance and little management value. Meanwhile, we should give security guarantees for the sharing information files since they are outsourced. Unfortunately, because of the frequent modification of the attachment, allocation information while provided that privacy-preserving is still a challenging issue, especially for an untrusted cloud owed to the collusion hit. Moreover, for existing schemes, the security of key distribution relies on the secure line, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a protected data distribution system for energetic members. Firstly, we propose a secure method for key distribution while not any protected communication channel and the user can strongly acquire their non-public keys from group manager. Secondly, our design can attain fine-grained access organize, any user within the group can use the source in the cloud and revoked users cannot access the cloud again after they're revoked. Thirdly, we can shield the scheme from collusion attack, which means that revoked users cannot get the initial file even though they conspire with the untrusted cloud. In our approach, by leveraging polynomial operate; we can achieve a secure user revocation scheme. Finally, our scheme will succeed fine potency, which means that previous users needn't to update their non-public keys for matters either a replacement user joins within the group or a user is revoked from the group.
Key Words:-Access power, Privacy-preserving, Key distribution, Cloud compute
Area:-Engineering
Download Paper: 
Preview This Article

Unable to display PDF file. Download instead.


Download Paper

Downlaod Paper

No. of Download

000155

Impact Factor

7.4


ijaece

Upcoming Events


Special Issue For Paper


Upcoming Conference


Call For Paper