Date of Publication :9th June 2017
Abstract: Cloud computing is a rapidly emerging technology that provides storage and computing services to the customers on demand. Due to loss of control over the data and computation, many security issues will arise in cloud computing environment. In case of data shared among group members, there exist certain additional security issues that need to be addressed. The main purpose of this paper is to provide data security and efficient key management in group shared data using multi-clouds, for storing the encrypted data in blocks. Secure Sharing of Group Data in Public Clouds counters security issues in group shared data by providing data confidentiality, integrity, backward and forward access control, using AES 256 bit encryption technique and efficient key management. The main key, which is used for encrypting the data, is not stored anywhere. But the key is divided into two parts, one part of the key is stored in the trusted server and the other part is sent to the user. Encrypted data is divided into blocks and stored in different clouds. Whenever the user requests for the data, he sends his key to the server. The server retrieves the data blocks stored in different clouds and combines it to get the encrypted data. The encrypted data is finally decrypted using the key generated by combining the key sent by the user and the key stored in the server for the corresponding user
Reference :
-
- Y. Chen and W. Tzeng, “Efficient and provably-secure group key management scheme using key derivation,” in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295– 302.
- A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, “Incremental proxy re-encryption scheme for mobile cloud computing environment,” J. Supercomput., vol. 68, no. 2, pp. 624–651, May 2014.
- A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278–1299, Jul. 2013.
- L. Xu, X. Wu, and X. Zhang, “CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud,” in Proc. 7th ACM Symp. Inf. , Comput. Commun. Security, 2012, pp. 87– 88.
- S. Seo, M. Nabeel, X. Ding, and E. Bertino,“An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107–2119, Sep. 2013.
- Y. Chen, J. D. Tygar, andW. Tzeng,“Secure group key management using uni-directional proxy re-encryption schemes,” in Proc. IEEE INFOCOM, pp. 1952–1960.
- Babitha.M.P, K.R. Remesh Babu, “Secure Cloud Storage Using AES Encryption,” 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) International Institute of Information Technology (I²IT), Pune.
- Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U.Khan, Athanasios V. Vasilakos, Albert Y. Zomaya, “SeDaSC: Secure Data Sharing in Clouds,” 2015 IEEE SYSTEM JOUNAL.