International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 132

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016


A Secure Group Sharing Framework Using TGDH Scheme

Shahina K M


Abstract: Cloud computing is a kind of Internet computing mainly used for data storage and data sharing. Secure data sharing among the group members is also an important concept in cloud. But privacy and security of users data are the major issues in cloud. And the semi trust nature of cloud service provider is also an important issue. Due to this semi-trusted nature of CSP traditional security mechanisms cannot be applied directly. . In this paper, we propose a secure group sharing framework using TGDH scheme for cloud computing, which can effectively take advantage of the Cloud Servers help without exposing any sensitive data to attackers and the cloud provider. This framework combines enhanced TGDH, proxy re-encryption, EIGamal signature generation and A-S algorithm together into a protocol. Enhanced TGDH scheme is used for the generation of dynamic group key pairs. Proxy re-encryption is adopted for ensuring forward and backward secrecy. Digital signatures are generated by the use of EIGamal algorithm with random key and group public key. A-S algorithm is used for data encryption. The security requirements for cloud based data sharing are fulfilled by our proposed scheme with high efficiency. And it can be proved by the extensive security and performance analysis.


Keywords: A-S algorithm, EIGamal signature generation, Enhanced TGGDH scheme, Proxy re-encryption


Edition: Volume 5 Issue 7, July 2016,


Pages: 668 - 673


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shahina K M, "A Secure Group Sharing Framework Using TGDH Scheme", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 668-673, https://www.ijsr.net/get_abstract.php?paper_id=4071606

Similar Articles with Keyword 'AS algorithm'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2377 - 2379

Survey of Fast Nearest Neighbor Search

Rutuja Panjabrao Desai | S. R. Patil

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S | Gowrishankar S [3]

Share this Article
Top