International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Implementation of Robust Multi Owner Multi Group Data Security Algorithm for Cloud Environment

Charanraj B R, K.R. Shylaja, Ravinandan M E

Cloud computing is a kind of centralized database where number of clients accumulate their data; recover data and possibly adjust data. Concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent so have to use Blowfish-AES encryption and zip an encrypted files before uploading for reduce memory space. Multi owner scheme (MOS) for data sharing by supporting dynamic groups efficiently so that revocation can be easily achieved. This guarantees any member in a group to anonymously utilize the cloud resource; so security issues rapidly arises when group owner adopted this Multi owner scheme.

Keywords: Cloud, Blowfish-AES encryption, group signature, revocation, Zip method

Edition: Volume 3 Issue 6, June 2014

Pages: 1182 - 1185


How to Cite this Article?

Charanraj B R, K.R. Shylaja, Ravinandan M E, "Implementation of Robust Multi Owner Multi Group Data Security Algorithm for Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=11061401, Volume 3 Issue 6, June 2014, 1182 - 1185

27 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2366 - 2370

A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage

Jaikishan Tindwani, Aruna Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this article



Similar Articles with Keyword 'group signature'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1182 - 1185

Implementation of Robust Multi Owner Multi Group Data Security Algorithm for Cloud Environment

Charanraj B R, K.R. Shylaja, Ravinandan M E

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1930 - 1937

A Cloud Approach for Secure Multi Data sharing between the Users

Deeti Naga Vijay, A. Jyothi

Share this article



Similar Articles with Keyword 'revocation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2319 - 2324

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

Athulya Prabhakaran, Nithya VP

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1590 - 1593

Secure Data Retrieval Using CP-ABE Approach For Decentralized Disruption-Tolerant Military Networks

Karpe Navanath R. Patil Kalyani S. Panchabuddhe Priyanka P.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this article
Top