Multi - owner Secure Data Sharing in Cloud Computing Environment



Data sharing in the cloud is a technique that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to cost reduction and the great conveniences provided by cloud services. Data owner is not able to control over their data, because cloud service provider is a third party provider.  The main crisis with data sharing in the cloud is the privacy and security issues. Various techniques are available to support user privacy and secure data sharing. This paper focus on various schemes to deal with secure data sharing such as Data sharing with forward security, secure data sharing for dynamic groups, Attribute based data sharing, encrypted data sharing and Shared Authority Based Privacy-Preserving Authentication Protocol for access control of outsourced data.


Cloud; Data Sharing; Access Control; Security; Privacy;


. Zhongma Zhu and Rui Jiang, “ A Secure AntiCollusion Data Sharing Scheme for Dynamic Groups in the Cloud,” IEEE Transactions On Parallel And Distributed Systems, Vol. 27, No. 1, January 2016.

. Hong Liu, HuanshengNing, QingxuXiong and Laurence T. Yang, “Shared Authority Based PrivacyPreserving Authentication Protocol in Cloud Computing,” IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 1, January 2015.

. Xin Dong a, Jiadi Yu a, Yuan Luo , Yingying Chen, GuangtaoXue , Minglu Li, “Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing,” ScienceDirect journal homepage: & s e c u rity 4 2 ( 2 0 1 4 ) 1 5 1 e1 6 4, Elsevier Ltd 2013.

. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 6, June 2013.

. KaipingXue and Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” . Citation information: DOI 10.1109/TCC.2014.2366152, IEEE Transactions on Cloud Computing.

. HUANG Qinlong, MA Zhaofeng, YANG Yixian, FU Jingyi and NIU Xinxin, “EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing,” Chinese Journal of Electronics Vol.24, No.4, Oct. 2015.

. unbeomHur, “Improving Security and Efficiency in Attribute-Based Data Sharing,” IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 10, October 2013.

. Ming Li Member, Shucheng Yu, Yao Zheng, KuiRen and Wenjing Lou, “ Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,” IEEE Transactions On Parallel And Distributed Systems 2012.

. Qiang Tang, “Nothing is for Free: Security in Searching Shared and Encrypted Data,” IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014.

. Xinyi Huang, Joseph K. Liu, Shaohua Tang, IEEE, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security,” IEEE Transactions On Computers, Vol. 64, No. 4, April 2015.

. R. A. Popa and N. Zeldovich, “ Multi-Key Searchable Encryption,”


. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 79–88.

. Tim, Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy: An Enterprise perspective of Risks and Compliance,” O'Reilly Media, Inc., 2009.

Zhiguo Wan, Jun’e Liu, and Robert H. Deng, Senior Member, IEEE, “HASBE: A Hierarchical Attribute-Base Solution for Flexible and Scalable Access Control in Cloud Computing” in Proc.IEEE Transactions on Information Forensics and Security, vol.7, No.2, April 2012.

Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, MateiZaharia. A view of cloud computing. Communications of the ACM, Volume 53 Issue 4, pages 50-58. April 2010.

S.Yu, C.Wang, K.Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. IEEE Infocom 2010, 2010, pp. 534– 542.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at