2023, Volume 7 Issue 1
Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment
AUTHOR(S)
Mallika P,Indhurekha S, Jarlin Jeincy
DOI: https://doi.org/10.46647/ijetms.2023.v07i01.027
ABSTRACT
In recent decades, group data sharing in cloud systems has been a prominent issue. With the rise in popularity of cloud computing, achieving safe and efficient data exchange in cloud settings is a pressing issue that must be addressed. Furthermore, achieving both anonymity and traceability in the cloud for data exchange is a difficulty. This work focuses on providing anonymous data exchange and storage in the cloud for the same group with good security and efficiency. A unique traceable group data sharing strategy is developed to allow anonymous multiple users in public clouds by leveraging the key agreement and the group signature. On the one hand, group members can communicate anonymously with regard to the group signature, and on the other hand, group members can track the anonymous members, chat within the group, store and share for secure instant access and updates.
Page No: 194 - 198
References:
1. Jian Shen; Huijie Yang; P Vijayakumar; Neeraj Kumar “A Privacy - Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing,” IEEE Transactions on Dependable and Secure Computing ,Jan 2021.
2. Q. Huang, Y. Yang, W. Yue and Y. He, "Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing," in IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp. 1607-1618, 1 Oct.-Dec. 2021.
3. J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Comput. Secur.,vol. 72, pp. 1–12, Jan. 2018.
4. T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,” IEEE Trans. Comput., vol. 65, no. 8, pp. 2363–2373, Aug. 2016.
5. J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive Mobile Comput., vol. 41, pp. 219– 230, Oct. 2017, doi: 10.1016/j.pmcj.2017.03.013.
6. J. Yu, K. Ren, C. Wang, and V. Varadharajan, “Enabling cloud storage auditing with key-exposure resistance,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1167– 1179, Jun. 2015.
7. X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, “New publicly verifiable databases with efficient updates,” IEEE Trans. Depends. Sec. Comput.,vol. 12, no. 5, pp.546–556, Sep. 2015.
8. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Trans. Parallel Distrib.Syst., vol. 25,no. 9, pp. 2386–2396, Sep. 2014.
9. J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Comput. Secur.,vol. 72, pp. 1– 12, Jan.2018, doi: 10.1016/j.cose.2017.08.007.
10. X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182– 1191, Jun. 2013.
11. Q. Liu, G. Wang, and J. Wu, “Time-based proxy re-encryption scheme for secure data sharing in a cloud environment,” Inf. Sci., vol. 258, pp. 355–370, Feb. 2014.
12. J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block design-based key agreement for group data sharing in cloud computing,” IEEE Trans.Depends. Sec. Comput., to be published, doi: 10.1109/TDSC.2017.2725953.
How to Cite This Article:
Mallika P,Indhurekha S, Jarlin Jeincy. Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment
. ijetms;7(1):194-198. DOI: 10.46647/ijetms.2023.v07i01.027