SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption
DOI:
https://doi.org/10.26438/ijcse/v6i5.118125Keywords:
Cloud Computing, Homomorphic Encryption, Security, Secure Sharing, Cryptography, Cryptographic Server, DecryptionAbstract
Cloud computing is fast growing technology that enables the users to store and access their data remotely. While accessing the data from cloud, different users may have relationship among them depending on some attributes, and thus sharing of data along with user privacy and data security becomes important to get effective result. In this paper, we design and implement Secure Data Sharing Approach i.e. SDSA, for dynamic groups in public cloud environment. In this technique, user uploaded their data on cryptographic server in encrypted format using Homomorphic encryption algorithm tiger hash algorithm is used for key generation which is input in the encryption algorithm. In SDSA a user is able to share data with others in the group without revealing characteristics privacy to the other user. Moreover, SDSA supports efficient user revocation and fresh user joining. More especially, efficient user revocation can be achieved through a public revocation list without harming security of the other remaining users in user portal. In addition, the storage overhead and the encryption decryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements along with the secure sharing with other and preserve privacy policy when group sharing is processed that guarantees efficiency as well.
References
Stallings, William. Cryptography and network security: principles and practice. Pearson Education India, 2003
Nadeem, Aamer, and M. Younus Javed. "A performance comparison of data encryption algorithms", In Information and communication technologies, 2005. ICICT 2005, First international conference on, pp. 84-89. IEEE, 2005.
Denning, Dorothy E., and Peter J. Denning. "Data security." ACM Computing Surveys (CSUR) 11, no. 3 (1979): 227-249.
Herdman, R. "Information security and privacy in network environments." The Office of Technology Assessment (OTA) (1994).
Sattarova Feruza Y. and Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security”, International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, April, 2007
Wei, Jianghong, Wenfen Liu, and Xuexian Hu. "Secure data sharing in cloud computing using revocable-storage identity-based encryption." IEEE Transactions on Cloud Computing (2016).
B. V. Varshini, M. Vigilson Prem and J. Geethapriya, “A Review on Secure Data Sharing in Cloud Computing Environment”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 3, March 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
