Cloud Data Sharing with Privacy Safeguards

  • Unique Paper ID: 172475
  • Volume: 11
  • Issue: 8
  • PageNo: 3245-3254
  • Abstract:
  • Ensuring The trend and the road breaker of data storage is followed increasingly by cloud computing. In this continuous increase of technology, cloud computing is playing a significant function. There are several types of clouds, which include private, public, and hybrid clouds, where numerous people share and store the data. This process is described as multi-party data storage. Using the multi-party idea, the data of the legit person cannot be read or accessed by the not-legitimate person since the data of the legit person who tries to store it in the cloud throughout this procedure will be encrypted before it is stored. To decrypt the data that is saved. We need to have the key, for sure. The key illumination of the problem is that the data can be traced. In a cloud system, one file is stored where two to three persons access the data, whom we declare are legitimate users. But the patterns may be traced by the outsider. Additionally, the changes performed by the legit users are saved in the form of logs so that outsiders can examine the contents in the file. The existing method cannot keep up with the dynamic environment. To circumvent these, as clearly stated in this paper, the group manager is going to share a unique key with the user following the registration. After the manager's approval, the user can upload a file, and here the files will be encrypted. Access to the file will be given to just the authentic persons who are in the same group, and to add on to this, they only access it when they use a verification method involving group keys and signatures sent at registration. The user privacy is established because no one from the group knew who posted it. In addition to this, to decrypt the file even if it is secure because the key was sent by mail.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 8
  • PageNo: 3245-3254

Cloud Data Sharing with Privacy Safeguards

Related Articles