Multi User Authentication in Reliable Data Storage in Cloud

Information out sourcing is the fundamental centering term in distributed computing. More information proprietors accomplishes in outsource their information into cloud servers. In any case, touchy data ought to be secured before outsourcing for protection necessities, which obsoletes data utilization like catchphrase based papers recuperation. A safe multi-catchphrase evaluated seek arrangement over secured thinking information, which in the meantime encourages intense update capacities like expulsion and position of records. In particular, the vector space outline and the broadly utilized TF–IDF configuration are blended in the list development and inquiry. But the ability of searching encryption is main challenge in secure multi keyword search with user activities of deletion, revoking of users with multiple user access control in cloud computing. In this paper we propose to BGKM (Broadcast Group Key Management) schema for multi user access control in user activities like data insertion, deletion and in user revocation in real time cloud application development. We evaluate the security of our BGKM plan and evaluate it with the current BGKM techniques which are mostly used for data accessing in real time cloud computing for achieving real time applications in cloud. Our experimental results show efficient data extraction from multi user access in searching of data from cloud servers.

[1]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Murat Kantarcioglu,et al.  A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[3]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[4]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Charalampos Papamanthou,et al.  Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.

[6]  Elisa Bertino,et al.  A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[7]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[8]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[9]  Hugo Krawczyk,et al.  Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..

[10]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[11]  Yaping Lin,et al.  Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[12]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[13]  Cong Wang,et al.  Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.