International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014 Privacy Data Sharing for a Group of Members in the Cloud YaragallaSarat Babu1, JayanthiRao Madina2 1 1,2 Final M.Tech Student, 2Head of the Department Dept of CSE,Sarada Institute of Science, Technology And Management(SISTAM), Srikakulam, Andhra Pradesh Abstract: Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharingof data in the cloud is very securely and also provide the authentication of users in the cloud. In this paper we are proposed the concept digital certificate for user authentication and key establishment by providing security of data in the cloud we are using Triple Des for encryption and decryption of data. So that by using those techniques we can provide more security and low maintenance of characteristics. I.INTRODUCTION In cloud computing the storage is in shared state which is offered by third party service providers. The data is stored in the network that is the group users in collaborative type.It is very general that the data remains over the period oftime. The data secrecy is in the could became morecompromised and to protect the data privacy in the cloudthat encrypts the data files and store in the database of thecloud service provider. But the designing is efficient andthe data sharing scheme for the cloud is not a very easytask that means the data owner should able to use all theservices that are provided by the cloud storage service. There are many techniques for sharing the dataand the store the data that have been concerned. In all thesemethods the data owners are encrypt the data and store inthe untrusted remote server. After storing the data it willdecrypt using the decryption keys with authorized users. This presents the intruders to access the encoded data. Forauthentication the data owners have to register in theservice provider for security issue.The novel data sharing the new data ownerregistration retrieves the identity of the new data owner inothers group. The new data owner has to take permissionfrom other data owners in the group before generating adecrypting key. In the traditional techniques that thesystem identified the problems during multi owner datasharing and proposed an efficient protocol andcryptographic technique for solving drawbacks in thetraditional approach. It proposed an efficient and novel secure key protocol for group key generation and usingthese key data owners can encrypt the files. II. RELATED WORK In previous researches the authors specified asecure data sharing for dynamic groups in remote ISSN: 2231-5381 storage.In multi-owner data sharing the data owners shares the data With others and the other group members. It supports theeffective user registration.Some other author introduced a cryptographictechnique in the storage system that provides security filesharing on untrusted services of the servers. But dividingthe file groups with other members which correspond tothe key services. And also the key needs renewal and theagain for the user activation. In [5], the contents of files placed on remoteserver are metadata and file data. The file metadatacontains the access control data that encompass collectionof encrypted keys. These metadata files are encrypted withpublic key of authorized users. As the file metadata shouldbe refurbished, the user abrogation in the scheme is anuncompromising issue particularly for large-scale sharing.Nonetheless, the private key should be regenerated for eachuser for every new user addition into the group. This limitsthe application to support dynamic groups. Another issue isthe encryption load enhances with the sharing scale. The proxy reencryption model given by Atenieseet al. [6] strengthens the distributed storage. The dataencryption done by the data owners is a twostepprocedure. First, encryption is done using exclusive andsymmetric content keys. Second, the data is encrypted witha master public key. Proxy cryptography is used by theserver to reencrypt the particular content key(s) from themaster public key. On the other hand, the remote storageserver can be attacked by any malicious user to find thedecryption keys of all encrypted blocks. From the above analysis, the author observed thathow to securely share data files in a multipleownermanner for dynamic groups while preserving identityprivacy from an untrusted cloud remains to be achallenging issue. In this paper, the author proposed anovel multi owner data sharing group key protocol forsecure data sharing in cloud computing. III. PROPOSED SYSTEM Now a days cloud computing place an important role for sharing of data through the network. For the sharing of data in network we are provide the security of that data. So that for providing security of data we are using cryptography technique. Before sharing data between users we are identify the user is authenticated or not. The authentication of users we are using digital signature algorithm. After completing generation signature the users send to KGC for the authentication purpose. The KGC will find the authentication of users KGC will generate key for http://www.ijettjournal.org Page 266 International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014 authenticated user. After sending key each user will encrypt and decrypt the data using that key.The following is details description of proposed system. Authentication of users: In this module each user will generate signature for authentication purpose. The generation of signature is as follows. 1. 2. 3. Choose a large prime number p with the range of 512 or 1024 bits and is multiple of 64. Choose q with the range of 160 bit prime divisor of p-1 Calculate g=h(p-1)/q User compute public and private keys: Signature generation: 6.Calculate r= (gk%p)%q. 7. generate signature s=[k-1 H(ID)+xr]%p. After generation of signature user will send the signature to KGC. The KGC will check the signature for authentication of users. The authentication of user as follows. The KGC will Calculate w=s-1%p. Calculate u1=[H(ID)w]%q. Calculate u2=rw%q. V=[(gu1yu2)%p]%q. After calculate v value for each users and the KGC will verify the authentication status of each user. After verify the authentication users the KGC will generate secret key for encrypt and decrypt of shared data. ISSN: 2231-5381 Where a and b are constant value for generating randomly. The secret key is also constant value For generating randomly. In this module each user retrieves equation from the KGC and generate secret key. After generation of secret key, the user encrypts and uploads stored data using that key ,by encrypting the data we can provide the security ofshared data.Providing security of data we are using any cryptography technique. In this paper we are using triple des algorithm.Before store data into cloud the user encrypt the data using triple DES and key. After encrypt the data user will stored into cloud. Retrieve data from cloud: After storing data into cloud if any user wants retrieve the data, before he/she generate secret key and retrieve that stored data. After retrieving stored data the user will generate secret key and decrypt that data. The decryption of retrieving data the user will also use the triple des algorithm. Signature verification : Shared key generation: F(n)=secretkey+bx2+ax Store data into cloud: 4.Choose x is greater than or equal to q. 5.Calculatey=gx % p 1. 2. 3. 4. After successful completion of authentication the KGC will generate shared key for data encryption and decryption. The generation of shared key the KGC will use the Shamir secret share and Lagrange’s equation. After generating shared key the KGC will send to key to all the authenticated users. The generation of shared key will be changed for every new user adding into group. The general format of Lagrange’s equation as follow. If any user wants to add this group the KGC will regenerate new shared key and distributed to all authenticated users. Before sending key to users the KGC will decrypt the cloud data using old key and encrypt the new shared key and stored into cloud. So if any user upload the retrieve data from the cloud he/she follows above steps. http://www.ijettjournal.org Page 267 International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014 1.Generate signature 6. en cr yp t 1.Generate signature 5.s 9.r en etr 5.s d ie 2.Send to KGC en ve 2.Send to KGCke d y pl ke ai y TriplenDES 1.Generate signature 1.Generate signature 2. Se nd to K 5.s end key 5.s en d ke y KGC 2. Se nd to K 3.Authentication users 4.Generate shared key 7.stored into cloud8.decrypt the data Cloud storage IV.CONCLUSION In cloud computing sharing of data through network in secure manner. For provide security of data we are using cryptography technique. Before provide security of data we can verify the given user authenticated or not. We can identify authentication of user we are using signature algorithm for verify authenticate user or not. The authentication user can be performed by the KGC. After completion authentication user the KGC will generate shared key for encryption and decryption of data. After generation shared key the KGC will forward to all authenticated. The authenticated user will retrieve shared key, encrypt data and stored into cloud. If any user wants that data he/she retrieve data from the decrypt it. In this paper the encryption and decryption of data can be done by using Triple DES algorithm. By provide those technique we can increase efficiency and performance of given system. ISSN: 2231-5381 REFERENCES [1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H.Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I.Stoica, and M. Zaharia,“Above the clouds: A Berkeley view of cloud computing,” University ofCalifornia,Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009. [2] Amazon Web Services (AWS), Online at http://aws.amazon.com. [3] Google App Engine, Online athttp://code.google.com/appengine/. [4] Microsoft Azure, http://www.microsoft.com/azure/. [5] 104th United States Congress, “Health InsurancePortability and AccountabilityAct of 1996 (HIPPA),” Online athttp://aspe.hhs.gov/admnsimp/pl104191.htm, 1996. [6] H. Harney, A. Colgrove, and P. D. McDaniel,“Principles of policy insecure groups,” in Proc.OfNDSS’01, 2001. [7] P. D. McDaniel and A. Prakash, “Methods andlimitations of securitypolicy reconciliation,” in Proc. Of0 SP’02, 2002. [8] T. Yu and M. Winslett, “A unified scheme for resourceprotection inautomated trust negotiation,” in Proc.OfSP’03, 2003. http://www.ijettjournal.org Page 268 International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014 [9] J. Li, N. Li, and W. H. Winsborough, “Automated trustnegotiationusing cryptographic credentials,” in Proc. OfCCS’05, 2005. [10] J. Anderson, “Computer Security TechnologyPlanning Study,” AirForce Electronic Systems Division,Report ESD-TR-73-51, 1972, BIOGRAPHIES JayanthiRaoMadina is working as a HODin Sarada Institute of Science, TechnologyAnd Management(SISTAM), Srikakulam,Andhra Pradesh. He received his M.Tech(CSE) from Aditya Institute ofTechnology And Management(AITAM),Tekkali. Andhra Pradesh. His researchareas include Image Processing, Computer Networks, DataMining, and Distributed Systems. He published six papers ininternational journals and he attended for threeconferences. YaragallaSaratBabu is a Student in M.Tech(CSE) in Sarada Institute of Science Technology And Management(SISTAM),Srikakulam. He Received hisB.Tech(IT) from Sarada Institute of Science Technology And Management(SISTAM),Srikakulam. His Interesting areas are Cloud computing, java and oracle,mysql database. ISSN: 2231-5381 http://www.ijettjournal.org Page 269