International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 143

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


A Secured Dynamic Group Sharing with V2 Signature and Encryption Techniques in Public Cloud

Rajani Sajjan | Vijay Ghorpade | Nayantara Yerate


Abstract: Cloud systems can be used to enable data sharing capabilities and this can provide an abundant of benefits to the user. As group data sharing in public cloud computing has gained lots of popularity, providing privacy and security to the data shared has become top most priority. The cloud has a semi-trust kind and so it needs a security model which has no confidential data being exposed to cloud providers and attackers. Another important factor in providing privacy and security is periodic removal of unwanted files which if not done regularly then, may become a part of interest for attackers and can be misused. For this purpose, a secure group sharing framework for public cloud is proposed which combines V2Signature Admin and Broadcast Encryption Techniques. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. The shared data will have a predefined life span which will be specified by data owner. When the life span expires, the group admin is responsible to ask the members whether they need that file anymore and take action accordingly. A very high authentication is required to achieve identity privacy.


Keywords: Identity Privacy, V2 Signature, Life Span


Edition: Volume 5 Issue 2, February 2016,


Pages: 83 - 86


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rajani Sajjan, Vijay Ghorpade, Nayantara Yerate, "A Secured Dynamic Group Sharing with V2 Signature and Encryption Techniques in Public Cloud", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 83-86, https://www.ijsr.net/get_abstract.php?paper_id=NOV1531351

Similar Articles with Keyword 'Identity Privacy'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A. [2] | Neethu Francis [2]

Share this Article

Downloads: 110

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2124 - 2127

A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation

Mahesh Shinde | Y.B.Gurav [3]

Share this Article
Top