Secure Key Agreement Model for Group Data Sharing and Achieving Data Deduplication in Cloud Computing

Author(s):  
Manav Ashok Thakur ◽  
Santosh Bari ◽  
Rutuja Deshmukh ◽  
Smita Auty
Author(s):  
Thukkaiprasanth. T ◽  
Dr. M. Ramesh Kumar ◽  
Sivagurunathan. A ◽  
UdhayaKumar. C, Vignesh.R. S ◽  

2019 ◽  
Vol 16 (6) ◽  
pp. 996-1010 ◽  
Author(s):  
Jian Shen ◽  
Tianqi Zhou ◽  
Debiao He ◽  
Yuexin Zhang ◽  
Xingming Sun ◽  
...  

2014 ◽  
Vol 989-994 ◽  
pp. 2349-2355
Author(s):  
Kang Kang Chen ◽  
Chen Lei Cao ◽  
Jian Yi Liu ◽  
Ru Zhang

In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on this security architecture and BFIBE, three security protocols are proposed to implement mutual authentication and key agreement, which can resist man-in-middle attacks and masquerading attacks. Besides, based the three protocols, an effective data sharing method is proposed.


The cloud computing provides convenient ondemand access of the data. Sharing of data in the cloud computing will enable several users to easily handle the data that is being shared. The medical-field finds more advantages by the cloud-computing technology as the data can be accessed anywhere and anytime by the patients as well as this data can be shared with other medical-practitioners. This alarms for the security issues as the huge amount of sensitive data is being shared. The data must not be available to malicious-attackers. In this paper, we propose the block-design based key agreement protocol in order to share the data securely and the design provides fault-detection and fault-tolerance. The group-data model PSM is given with the block-based design, which decides how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column. The design is proposed in our paper, which gives the technique for positioning of the users. The encryption and decryption of data is done and their times cost according to file size is found. The comparison of the time-cost for our model and existing models is compared with respect to different number of simulations.


2018 ◽  
Vol 7 (2) ◽  
pp. 646
Author(s):  
Sathishkumar Easwaramoorthy ◽  
Anilkumar Chunduru ◽  
Usha Moorthy ◽  
Sravankumar B

Information sharing or exchange of data within entities plays a significant role in cloud storage. In cloud computing, a robust and practical methodology is developed which can be utilized by cloud users for sharing information among multiple group members in the cloud with lowered maintenance and management costs. Furthermore, a service provider in the cloud does not share data with anyone other than the Trusted Third Party (TTP) sources due to the semi-trusted characteristics of the cloud. In this way, there is no global security mechanism for dynamic group data sharing over the cloud. Subsequently, the Cloud Service Providers (CSPs) can convey different services to cloud users through powerful data centres. Hence, data is secured through the validation of users in the cloud. Meanwhile, CSPs should offer outsourced security assurance for data file sharing. Assuring privacy in data sharing is still a critical issue due to continuous change in cloud users, particularly, for unauthenticated or third party users because of the risk of collusion attacks. However, security concerns turn into a major restraint as outsourcing storage data is perhaps a delicate concern for cloud providers. Additionally, sharing information in a multi-proprietary approach while protecting information and individual security to the data from unauthorized or third party users is still a challenging task as there is a frequent change in cloud members. In this regard, previous studies are reviewed and discussed which are related to dynamic group data sharing using cloud computing.


2021 ◽  
Vol 23 (06) ◽  
pp. 1733-1736
Author(s):  
Mohit Kabadi ◽  
◽  
Gitesh Ghorpade ◽  
Munot Sarode ◽  
Sameer Sagar ◽  
...  

Cloud computing is alleged to be the service homeward-bound computing technology, that ar reasonable and versatile over the web. In the past few years, the cloud has become more experienced and provided several services, one in all the first service is a knowledge sharing in the cluster, wherever the information is often simply shared from one member to a different. However, whereas sharing information security is one of the first concerns. In past, many methodologies have been planned. However, these strategies lacked feasibleness. Hence, during this paper, we’ve proposed a methodology that relies on the chosen theme. Here General cluster secret’s generated and what is more General Key agreement protocol is redistributed primarily based model wherever the information ar controlled by the owner inside the constant cluster. Moreover, the planned methodology is evaluated by analyzing the comparative analysis supported by the assorted range of parameters. Result Analysiscounsel that our methodology merely outperforms the present one.


Sign in / Sign up

Export Citation Format

Share Document