Open Access   Article Go Back

SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption

T. Aaliya1 , R. Sharma2

  1. Computer Science, RKDF School Of Engineering, RGPV, Indore, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 118-125, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.118125

Online published on May 31, 2018

Copyright © T. Aaliya, R. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. Aaliya, R. Sharma, “SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.118-125, 2018.

MLA Style Citation: T. Aaliya, R. Sharma "SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption." International Journal of Computer Sciences and Engineering 6.5 (2018): 118-125.

APA Style Citation: T. Aaliya, R. Sharma, (2018). SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption. International Journal of Computer Sciences and Engineering, 6(5), 118-125.

BibTex Style Citation:
@article{Aaliya_2018,
author = {T. Aaliya, R. Sharma},
title = {SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {118-125},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1947},
doi = {https://doi.org/10.26438/ijcse/v6i5.118125}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.118125}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1947
TI - SDSA: An Implementation of Secure Data Sharing Approach Using Homomorphic Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - T. Aaliya, R. Sharma
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 118-125
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
501 296 downloads 237 downloads
  
  
           

Abstract

Cloud computing is fast growing technology that enables the users to store and access their data remotely. While accessing the data from cloud, different users may have relationship among them depending on some attributes, and thus sharing of data along with user privacy and data security becomes important to get effective result. In this paper, we design and implement Secure Data Sharing Approach i.e. SDSA, for dynamic groups in public cloud environment. In this technique, user uploaded their data on cryptographic server in encrypted format using Homomorphic encryption algorithm tiger hash algorithm is used for key generation which is input in the encryption algorithm. In SDSA a user is able to share data with others in the group without revealing characteristics privacy to the other user. Moreover, SDSA supports efficient user revocation and fresh user joining. More especially, efficient user revocation can be achieved through a public revocation list without harming security of the other remaining users in user portal. In addition, the storage overhead and the encryption decryption computation cost are constant. Extensive analyses show that this proposed scheme satisfies the desired security requirements along with the secure sharing with other and preserve privacy policy when group sharing is processed that guarantees efficiency as well.

Key-Words / Index Term

Cloud Computing, Homomorphic Encryption, Security, Secure Sharing, Cryptography, Cryptographic Server, Decryption

References

[1] Stallings, William. Cryptography and network security: principles and practice. Pearson Education India, 2003
[2] Nadeem, Aamer, and M. Younus Javed. "A performance comparison of data encryption algorithms", In Information and communication technologies, 2005. ICICT 2005, First international conference on, pp. 84-89. IEEE, 2005.
[3] Denning, Dorothy E., and Peter J. Denning. "Data security." ACM Computing Surveys (CSUR) 11, no. 3 (1979): 227-249.
[4] Herdman, R. "Information security and privacy in network environments." The Office of Technology Assessment (OTA) (1994).
[5] Sattarova Feruza Y. and Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security”, International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, April, 2007
[6] Wei, Jianghong, Wenfen Liu, and Xuexian Hu. "Secure data sharing in cloud computing using revocable-storage identity-based encryption." IEEE Transactions on Cloud Computing (2016).
[7] B. V. Varshini, M. Vigilson Prem and J. Geethapriya, “A Review on Secure Data Sharing in Cloud Computing Environment”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 3, March 2017.