Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama
In this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption (CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.
Keywords: Data integrity, Data sharing, attribute-based encryption, removing escrow, privacy protection
Edition: Volume 4 Issue 5, May 2015
Pages: 2627 - 2631
How to Cite this Article?
Kamini H. Gonnade, Fazeel Zama, "Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154865, Volume 4 Issue 5, May 2015, 2627 - 2631
111 PDF Views | 99 PDF Downloads
Similar Articles with Keyword 'Data integrity'
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2467 - 2469Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud
Shazadi Fatima Rizvi, A. N. Jaiswal
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2124 - 2127A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
Mahesh Shinde, Y.B.Gurav
Similar Articles with Keyword 'Data sharing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Similar Articles with Keyword 'attribute-based encryption'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1324 - 1327Enhancing Organization Security using Attribute-Based Encryption for Data Sharing
Priya D. Tangde, A. S. Chhajed
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Similar Articles with Keyword 'removing escrow'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2627 - 2631Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 119 - 122Improving Security and Efficiency in Attribute-Based Data Sharing
M. Pratheepa, R. Bharathi
Similar Articles with Keyword 'privacy protection'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1640 - 1647Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines
Uma Maheswari.T, Dr.V. Kavitha
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2611 - 2615Bidirectional Location Privacy Protection Schemes against Internal Adversary in WSN
Samson Raja T, S. Satheesbabu, Dr. K. Balasubadra