Loading

An Approach to Zero Knowledge Proof for Secure Data Sharing in Cloud Storage: New Direction
Amjan Shaik1, B. Madhurima2, M. Neelakantappa3

1Amjan Shaik, RNS Institute of Technology, Bengaluru, Karanataka, India.

2B. Madhurima, RNS Institute of Technology, Bengaluru, Karanataka, India.

3M. Neelakantappa, RNS Institute of Technology, Bengaluru, Karanataka, India.

Manuscript received on 10 December 2018 | Revised Manuscript received on 17 December 2018 | Manuscript Published on 30 December 2018 | PP: 195-201 | Volume-8 Issue- 2S December 2018 | Retrieval Number: BS2703128218/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a days, Cloud computing (CC) is seriously growing because of it’s strengths like elastic, flexible, on-demand storage and fast computing services for users. In cloud based storage concept, data owner does not have full control over own data because data controlled by the third party called cloud service providers (CSP). The most challenging issue in data security arises when the owner of the data shares to other through cloud. This issue is very common as data is shared in the cloud computing environment. This issue is addressed by few researchers through encryption techniques of cryptography to provide secure data-sharing on the cloud. In this paper, we propose a model to provide security of shared data on cloud in terms of access control and data confidentiality. This system eliminates the need of key management and file encryptions and descriptions by the users. It also supports dynamic changes of user permissions (Read,Write), there by removes the need of owner to be always online during user accessing of data from cloud. In this system, we extended the notion of zero-knowledge proofs of the membership (that reveals 1 bit of information) to zero-knowledge proofs of the knowledge(that reveals no information at all). The common weakness of conventional communication protocols is they are vulnerable to the impersonation attacks. Each time this type of protocol is executed, the system degrades due to the threat of an eavas-dropper listening the communication. The main objective of this designed system is that it makes possible for a prover for convincing a verifier of his knowledge of a certain secret without revealing any information apart from validity of his claim.

Keywords: Cloud Computing, Cloud Storage, Data Security, cloud Service Provider, Secure Sharing, Cryptography.
Scope of the Article: Communication