High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Key Agreement Model for Group Data Sharing in Cloud Computing

Author(s):

Khilesh Barela , Loknete Gopinathji Munde Institute of Engineering Education & Research Nashik.; Samir Wagh, Loknete Gopinathji Munde Institute of Engineering Education & Research Nashik.; Vishal Walunj, Loknete Gopinathji Munde Institute of Engineering Education & Research Nashik.; Madan Kutke, Loknete Gopinathji Munde Institute of Engineering Education & Research Nashik.; Prof. Priyanka Naoghare, Loknete Gopinathji Munde Institute of Engineering Education & Research Nashik.

Keywords:

Data Sharing, Cloud Computing

Abstract

Data sharing in cloud computing permits multiple participants to freely share the cluster information that improves the efficiency of labor in cooperative environments and has widespread potential applications. However, some way to create certain the safety of {knowledge of information} sharing among and also the thanks to efficiently share the outsourced knowledge in AN extremely cluster manner area unit formidable challenges. Note that key agreement protocols have contend a very necessary role in secure and economical cluster information sharing in cloud computing. during this paper, by taking advantage of the trigonal balanced incomplete block vogue (SBIBD), we tend to gift a completely unique block design-based key agreement protocol that supports multiple participants, which can flexibly extend the number of participants in AN extremely cloud surroundings the structure of the block style. supported the planned cluster information sharing model, A key agreement protocol is employed to get a typical conference key for multiple participants to confirm the safety of their later communications, and this protocol may be applied in cloud computing to support secure and economical information sharing . we tend to projected a block style primarily based key agreement protocol within which , TPA realize malicious user from cluster and take away from cluster we've an inclination to gift general formulas for generating the common conference key K for multiple participants. Note that by taking advantage of the (v; k + 1; 1)-block style, the procedure complexness of the planned protocol linearly can increase with the number of participants and additionally the communication quality is greatly reduced. In addition, the fault tolerance property of our protocol permits the cluster information sharing in cloud computing to set about to totally different key attacks, that's analogous to Yi's protocol.

Other Details

Paper ID: IJSRDV6I10394
Published in: Volume : 6, Issue : 1
Publication Date: 01/04/2018
Page(s): 563-567

Article Preview

Download Article