A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era

Subscribe our YouTube channel for latest project videos and tutorials Click Here

Posted By freeproject on February 12, 2021

INTRODUCTION OF THE PROJECT

A cloud-based big data sharing system utilizes a storage facility from a cloud service provider to share data with legitimate users. In contrast to traditional solutions, cloud provider stores the shared data within the large data centers outside the trust domain of the info owner, which can trigger the matter of knowledge condentiality. This paper proposes a secret sharing group key management protocol (SSGK) to guard the communication process and shared data from unauthorized access. Different from the prior works, a gaggle key's wont to encrypt the shared data and a secret sharing scheme is employed to distribute the group key in SSGK. The extensive security and performance analyses indicate that our protocol highly minimizes the safety and privacy risks of sharing data in cloud storage and saves about 12% of space for storing.

EXISTING SYSTEM

Rao proposed a secure sharing schemes of private health records in cloud computing supported ciphertextpolicy attributed-based(CP-ABE) signcryption. It specialise in restricting unauthorized users on access to the confidential data. Liu et al. proposed an access control policy supported CP-ABE for private records in cloud computing also. In and only one fully trusted central authority within the system is liable for key management and key generation.

Huang et al. introduced a completely unique public key encryption with authorized equality warrants on all of its ciphertext or a specified ciphertext. To strengthen the securing requirement, Wu et al. proposed an efficient and secure identity-based encryption scheme with equality test in cloud computing. Xu et al. proposed a CP-ABE using bilinear pairing to supply users with searching capability on ciphertext and fine-grained access control. He et al. proposed a scheme named ACPC aimed toward providing secure, efficient and fine grained data access control in P2P storage cloud.

Recently, Xue et al. proposed a replacement framework, named RAAC, to eliminate the single-point performance bottleneck of the exiting CP-ABE based access control schemes for public cloud storage. While these schemes use identity privacy by using attribute-based techniques which fail to guard user attribute privacy.

The foremost recent work addressing the privacy issues during a cloud-based storage is administered by Pervez et al. who proposed a privacy aware data sharing scheme SAPDS. It combines the attribute based encryption along side proxy re-encryption and secret key updating capability without counting on any trusted third party. But the storage and communication overhead of SAPDS is set by attribute encryption scheme.

Disadvantages

  • within the existing work, there's no group based access system.
  • The system’s security is extremely less thanks to lack of strong cryptography techniques.

PROPOSED SYSTEM

In SSGK, an efcient solution is proposed to unravel the secure problems of knowledge sharing on the cloud storage without counting on any trust third party. Beyond using symmetric encryption algorithm to encrypt the shared data, asymmetric algorithm and secret sharing scheme is employed to stop the key wont to decrypt the shared data from getting by unauthorized users. Secret sharing schemes were introduced by both Blakley and Shamir independently in 1979 as solution for safe guarding cryptography keys. during a secret sharing scheme, a secret is split into n shares by a dealer and shared among n shareholders. Any t shares can reconstruct this secret. Chor et al. extended the notion of the first secret sharing and presented a notion of verifiable secret sharing (VSS). The property of verifiability means shareholders are ready to verify whether their shares are consistent.

Advantages

  • The info owner is completely trusted and can never be corrupted by any adversaries.
  • The system is more secured thanks to the group key's distributed by running the key sharing scheme. Parts of the group members can gather their sub secret shares to reconstruct the group key.
Call FreeProjectz WhatsApp FreeProjectz