ijaser
IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality
applications and services from a shared pool of configurable computing resources, without the burden of local
data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced
data makes the data integrity protection in cloud computing a formidable task, especially for users with
constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local,
without worrying about the need to verify its integrity. Sharing data in a multi-owner manner while preserving
data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the
membership. All the users in the cloud provide their resources to the customer (or) a third party by sharing their
data in a common area. Group Formation makes it simple, for a group of members to share their resources.
Group Members in the cloud are identified with their group id or user id. The user has to share or retrieve their
data from the cloud using their user id, where user's id is used to authenticate the user. The user id should be
secured from third party in a cloud especially in a group using revocation list. The revocation list has to identify
an authenticated user. Our work in this paper is to secure the user id, in such a way that a third party will not be
able to retrieve any data without the user id. This is applicable even for a dynamic group, by using ring signature
algorithm. By using Ring signature, any user can securely share the data with others in the group. This reduces
the storage overhead and computation cost.