Multi User Authentication in Reliable Data Storage in Cloud

  • Sk. Yakoob
  • V. Krishna Reddy
  • C. Dastagiraiah
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


Information out sourcing is the fundamental centering term in distributed computing. More information proprietors accomplishes in outsource their information into cloud servers. In any case, touchy data ought to be secured before outsourcing for protection necessities, which obsoletes data utilization like catchphrase based papers recuperation. A safe multi-catchphrase evaluated seek arrangement over secured thinking information, which in the meantime encourages intense update capacities like expulsion and position of records. In particular, the vector space outline and the broadly utilized TF–IDF configuration are blended in the list development and inquiry. But the ability of searching encryption is main challenge in secure multi keyword search with user activities of deletion, revoking of users with multiple user access control in cloud computing. In this paper we propose to BGKM (Broadcast Group Key Management) schema for multi user access control in user activities like data insertion, deletion and in user revocation in real time cloud application development. We evaluate the security of our BGKM plan and evaluate it with the current BGKM techniques which are mostly used for data accessing in real time cloud computing for achieving real time applications in cloud. Our experimental results show efficient data extraction from multi user access in searching of data from cloud servers.


Cloud computing BGKM Secure multi key word search Quality based encryption 


  1. 1.
    Zhihua Xia, Xingming Sun,: A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE trans on parallel and distributed systems, vol. 99, pp: 340–352, (2015).Google Scholar
  2. 2.
    Ren. K., Wang. C., Wang. Q.,: Security challenges for the public cloud. IEEE Internet Computing, vol. 16, pp. 69–73, (2012).Google Scholar
  3. 3.
    Kamara. S., Lauter. K,,: Cryptographic cloud storage. Financial Cryptography and Data Security. Springer, pp. 136–149 (2010).Google Scholar
  4. 4.
    Gentry. C.: “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford University, (2009).Google Scholar
  5. 5.
    Wang. C, Ren. K, Yu. S, K. M. R. Urs.: Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM, 2012 Proceedings IEEE. IEEE, pp. 451–459 (2012).Google Scholar
  6. 6.
    Cao. N, Wang. C., Li. M, Ren. K., Lou. W.,: Privacy-preserving multi-keyword ranked search over encrypted cloud data in IEEE INFOCOM, pp. 829–837, April (2011).Google Scholar
  7. 7.
    Sun. W., Wang. B., Cao. N., Li. M, Lou. W, Hou. Y.T., Li. H,: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp. 71–82 (2013).Google Scholar
  8. 8.
    Orencik. C, Kantarcioglu. M., Savas. E.: A practical and secure multi-keyword search method over encrypted cloud data. in Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on. IEEE, pp. 390–397 (2013).Google Scholar
  9. 9.
    Zhang. W., Xiao. S., Lin. Y., Zhou. T., Zhou. S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. in Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on. IEEE, pp. 276–286 (2014).Google Scholar
  10. 10.
    Kamara. S., Papamanthou. C., Roeder. T.: Dynamic searchable symmetric encryption. in Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp. 965–976, (2012).Google Scholar
  11. 11.
    Kamara. S, Papamanthou. C.: Parallel and dynamic searchable symmetric encryption in Financial Cryptography and Data Security. Springer, pp. 258–274 (2013).Google Scholar
  12. 12.
    Cash. D, Jarecki. S, Jutla. C, Krawczyk. H., Rosu. M. C., Steiner. M.: Highly-scalable searchable symmetric encryption with support for boolean queries. in Advances in Cryptology– CRYPTO(2013). Springer, pp. 353–373 (2013).Google Scholar
  13. 13.
    Yu, Wang. S., C., Ren, K., & Lou, W.,: Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, (2010) Proceedings IEEE, pp 1–9, (2010).Google Scholar
  14. 14.
    Shang. N., Nabeel. M., Paci. F., Bertino. E.: A privacy-preserving approach to policy-based content dissemination. in ICDE’10: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 1–33, (2010).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of CSEK L UniversityVijayawadaIndia

Personalised recommendations