SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption

Authors

  • Aaliya T Computer Science, RKDF School Of Engineering, RGPV, Indore, India
  • Sharma R Computer Science, RKDF School Of Engineering, RGPV, Indore, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.118125

Keywords:

Cloud Computing, Homomorphic Encryption, Security, Secure Sharing, Cryptography, Cryptographic Server, Decryption

Abstract

Cloud computing is fast growing technology that enables the users to store and access their data remotely. While accessing the data from cloud, different users may have relationship among them depending on some attributes, and thus sharing of data along with user privacy and data security becomes important to get effective result. In this paper, we design and implement Secure Data Sharing Approach i.e. SDSA, for dynamic groups in public cloud environment. In this technique, user uploaded their data on cryptographic server in encrypted format using Homomorphic encryption algorithm tiger hash algorithm is used for key generation which is input in the encryption algorithm. In SDSA a user is able to share data with others in the group without revealing characteristics privacy to the other user. Moreover, SDSA supports efficient user revocation and fresh user joining. More especially, efficient user revocation can be achieved through a public revocation list without harming security of the other remaining users in user portal. In addition, the storage overhead and the encryption decryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements along with the secure sharing with other and preserve privacy policy when group sharing is processed that guarantees efficiency as well.

References

Stallings, William. Cryptography and network security: principles and practice. Pearson Education India, 2003

Nadeem, Aamer, and M. Younus Javed. "A performance comparison of data encryption algorithms", In Information and communication technologies, 2005. ICICT 2005, First international conference on, pp. 84-89. IEEE, 2005.

Denning, Dorothy E., and Peter J. Denning. "Data security." ACM Computing Surveys (CSUR) 11, no. 3 (1979): 227-249.

Herdman, R. "Information security and privacy in network environments." The Office of Technology Assessment (OTA) (1994).

Sattarova Feruza Y. and Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security”, International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, April, 2007

Wei, Jianghong, Wenfen Liu, and Xuexian Hu. "Secure data sharing in cloud computing using revocable-storage identity-based encryption." IEEE Transactions on Cloud Computing (2016).

B. V. Varshini, M. Vigilson Prem and J. Geethapriya, “A Review on Secure Data Sharing in Cloud Computing Environment”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 3, March 2017.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.118125
Published: 2025-11-13

How to Cite

[1]
T. Aaliya and R. Sharma, “SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 118–125, Nov. 2025.

Issue

Section

Research Article