ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 8)

Publication Date:

Authors : ; ; ;

Page : 423-430

Keywords : KEYWORDS: Cloud; User revocation; Signature Generation; Signature Verification; Revocation Verification;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing refers to the delivery of computing resources over the Internet. Cloud provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. It provides high level of scalability, reliability and efficiency. In this paper we propose a secure data sharing scheme within the groups and how encryption techniques help the groups in sharing the data dynamically. Sharing of data between dynamic groups the storage overhead and encryption computation cost changes based on revoked users. So to avoid, this we are providing three level of security mechanism for individual members in a group with the help of encryption techniques to share data. In this technique data can be uploaded in to the server after the encryption of the content by the secret group key. When a new member is added to the group, this user can be granted access to the file wherein he can directly download the decrypted data file, without contacting the data owners but when they are downloading the file a secret key is generated and sent to their own mobile number, using that key user can download the data. Due to this mechanism data in the cloud is secured.

Last modified: 2016-08-08 19:44:27