Identity Based Reliable Data Sharing with Revoked System in Cloud

  • Sneha D. Raut
  • Nagaraju BogiriEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 44)


In cloud storage services, users can store their data remotely on the cloud and exchange data with others. The cloud files consist of sensitive information. At the time of file sharing, may realizing the sensitive information of files hide, but this shared file cannot be used by others. The problem is to how to perform data sharing with sensitive information. To solve this problem, propose a Revocation algorithm to avoid the use of sensitive files from unauthorized users. In the system first, The system sanitizes the data blocks and data blocks corresponding to the organization’s sensitive information, sanitizes the sanitized data blocks signatures, and finally, sanitizers the sanitized files and their corresponding signatures in the cloud. These signatures are used to verify the integrity of files sanitized during the integrity audit phase. TPA then checks the integrity of the disinfected file. In this way, we are provide security for sharing data.


Cloud storage Data integrity auditing Revocation algorithm Sensitive information hiding 


  1. 1.
    Yu, J., Shen, W., Qin, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and datasharing with sensitive information hiding for secure cloud storage (2018)Google Scholar
  2. 2.
    Zhang, H., Lu, X., Shen, W., Xia, H., Yu, J., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium (2017)Google Scholar
  3. 3.
    Ren, K., Wang, C., Yu, J., Varadharajan, V.: Enabling cloud storage auditing with key-exposure resistance. IEEE (2015)Google Scholar
  4. 4.
    Ren, K., Yu, J., Wang, C.: Enabling cloud storage auditing with verifiable outsourcing of key updates (2016)Google Scholar
  5. 5.
    Shen, W., Yang, G., Su, Q., Fu, Z., Yu, J., Hao, R.: enabling public auditing for shared data in cloud storage supporting identity privacy and traceability (2016)Google Scholar
  6. 6.
    Li, B., Wang, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud (2015)Google Scholar
  7. 7.
    Wang, D., Xu, M., Fu, S., Luo, Y., Deng, J.: Efficient integrity auditing for shared data in the cloud with secure user revocation (2015)Google Scholar
  8. 8.
    He, D., Wang, H., Tang, S.: identity-based proxy oriented data uploading and remote data integrity checking in public cloud (2016)Google Scholar
  9. 9.
    Xie, D., Li, J., Li, J., Cai, Z.: Secure auditing and deduplicating data in cloud (2016)Google Scholar
  10. 10.
    Koo, D., Hur, J., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage (2016)Google Scholar
  11. 11.
    Dhivya, J., Aanjan Kumar, S.: Efficient cloud data sharing with strong key analysis using intelligent crypto system. Int. J. Innov. Res. Comput. Commun. Eng. (2018)Google Scholar
  12. 12.
    Prasanna, A.H.N.V.L., Surya Ram Prasad, K., Suri Babu, D.D.D.: Simple protocol to restrict client key exposure over cloud storage systems for auditing. Int. Res. J. Eng. Technol. (IRJET) (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.K. J. College of Engineering and Management ResearchSavitribai Phule, Pune Univercity PunePuneIndia

Personalised recommendations