decentralization for knowledge sharing in cloud environment for anonymous protection ·...

16
1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION 1 Manjula Josephine. B, 2 Shilpa Itnal and 3 Ramya Mounika Devineni 1 Department of CSE, Koneru Lakshmaiah Education Foundaion, Green Fields, Vaddeswaram, Guntur, Andhra Pradesh, India 2 Department of CSE, Koneru Lakshmaiah Education Foundaion, Green Fields, Vaddeswaram, Guntur, Andhra Pradesh, India 3 Department of CSE, Usha Rama College of Engineering and Tehcnology, Near Gannavaram, Ungutur Mandalam, Krishna District, Telaprolu, Andhra Pradesh [email protected]; [email protected]; [email protected] ABSTRACT The process of developing cloud architecture, requires cloud space admin, data owner and end user as the three main modules. Cloud admin associates for providing storage of data for various databases. Multiple tenancies to the cloud may arise the issues of security and privacy, and these are the most common problems in the cloud environment. So data stored in the various cloud user data-centric model need protection. Data divided based on "onion approach," in this user can hold the data logging into the cloud in a separate secure way to protect the data. So, in this approach data owner will be provided a reliable way to store data without any insecurity. Therefore an encryption will be performed on the data stored in the cloud so to access the information a protected key needs to provided by the data owner to obtaining user that will be with data owner, whom he/she wills to share only he can share. Due to this search, write and read operations in the cloud will be secure. Securing databases or data contents from the web world environment is an issue of security for a company. In these whole environment securing the data area such as web hosting and cloud, space storage is becoming very prominent for all websites and even for many companies. Many algorithms were carried out with a secured sharing solutions. Here a novel approach with highly secured and efficient sharing option for data retrieving by an end user is demonstrating. The technique comprises with Blowfish encryption scheme with KNN for cloud architecture using ONION process. In this paper, Knowledge Management as an example considered for development and that helps in sharing the data, loading the data and change the data. The entire data was processed with cloud streaming and also advances by using anonymous user authentication security. Keywords: Cloud, Knowledge Management, KNN, Authentication security. International Journal of Pure and Applied Mathematics Volume 119 No. 7 2018, 1275-1290 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 1275

Upload: others

Post on 23-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

1

DECENTRALIZATION FOR KNOWLEDGE SHARING IN

CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION

1Manjula Josephine. B,

2Shilpa Itnal and

3Ramya Mounika Devineni

1Department of CSE, Koneru Lakshmaiah Education Foundaion, Green Fields, Vaddeswaram,

Guntur, Andhra Pradesh, India 2Department of CSE, Koneru Lakshmaiah Education Foundaion, Green Fields, Vaddeswaram,

Guntur, Andhra Pradesh, India 3Department of CSE, Usha Rama College of Engineering and Tehcnology, Near Gannavaram,

Ungutur Mandalam, Krishna District, Telaprolu, Andhra Pradesh

[email protected]; [email protected]; [email protected]

ABSTRACT

The process of developing cloud architecture, requires cloud space admin, data owner and end

user as the three main modules. Cloud admin associates for providing storage of data for various

databases. Multiple tenancies to the cloud may arise the issues of security and privacy, and these

are the most common problems in the cloud environment. So data stored in the various cloud user

data-centric model need protection. Data divided based on "onion approach," in this user can hold

the data logging into the cloud in a separate secure way to protect the data. So, in this approach

data owner will be provided a reliable way to store data without any insecurity. Therefore an

encryption will be performed on the data stored in the cloud so to access the information a

protected key needs to provided by the data owner to obtaining user that will be with data owner,

whom he/she wills to share only he can share. Due to this search, write and read operations in the

cloud will be secure.

Securing databases or data contents from the web world environment is an issue of security for a

company. In these whole environment securing the data area such as web hosting and cloud,

space storage is becoming very prominent for all websites and even for many companies. Many

algorithms were carried out with a secured sharing solutions. Here a novel approach with highly

secured and efficient sharing option for data retrieving by an end user is demonstrating. The

technique comprises with Blowfish encryption scheme with KNN for cloud architecture using

ONION process.

In this paper, Knowledge Management as an example considered for development and that helps

in sharing the data, loading the data and change the data. The entire data was processed with

cloud streaming and also advances by using anonymous user authentication security.

Keywords: Cloud, Knowledge Management, KNN, Authentication security.

International Journal of Pure and Applied MathematicsVolume 119 No. 7 2018, 1275-1290ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

1275

Page 2: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

2

1. INTRODUCTION

Now a day's all the application requires databases in a huge lot. Therefore maintaining servers is

the biggest task all around, since it requires space, memory and cost-effective along with

maintenance of hardware servers. Consequently, every database required users look at cloud

storage units and accessing them with present applications by providing a secured data uploading

process from the data owner and protecting from other data used by not obtaining the data even

they download it.

With headway of computer group and far-reaching spread of system applications, clients, by and

large, need various servers to give several administrations. In like manner, the multi-server

engineering has been pervasive, and outlining a safe and proficient remote client verification

under multi-server design turns into a nontrivial challenge. In a decade ago, remote client

confirmation conventions have been advanced to relate to the multi-server situation necessities.

Be that as it may, these plans experienced specific security issues or their cost utilization

surpassed clients' obliged capacity. In this paper, we show an unknown remote client validation

with a key understanding plan for multi-server design utilizing self-guaranteed open keys without

pairings. The proposed plan can hold past plans' points of interest as well as accomplish client

protection concern. Besides, our proposition can increase higher productivity by evacuating the

pairings operation contrasted and the related plans. Through investigation and examination of the

associated methods, we can state that our proposition is as per the situation prerequisites and

plausible to the multi-server design.

This research presented a model of implementing of sharing of knowledge through a cloud,

security over the data shared and even can't access by the admin of the cloud without the key.

This allows personal protection for data owner to share the data for knowledge management.

Sharing of documents between a group of people, students or even in offices will lead us to

radiate the knowledge. Radiation of expertise on a specific content or related work between the

data owner and the consumer associated with our work using sharing of documents and posting of

queries can add in the future contribution.

a) Security over data storing the data.

b) Knowledge sharing between people and groups.

c) Dual personal protection with the private key.

d) True encryption with the key.

Today, maximum business institutions from little to medium-sized to expansive multinational

organizations can slightly pass into operation without relying on statistics. The expression

"records pushed" has been merely incomplete make use of and has very authentic in the front line

business operations.

With the quick progression in information innovation, database administration frameworks are

completing propelled great many stable database programming preparations are coming into the

market. Before, it became primary to have a focal database to serve most people of the institutions

needs.

Numerous records framework fashioners and engineers have been conserving the conviction that

focal control is better for database management. From this point of view, they noticed that an

introduced collective server coping with all facts in one practical and bodily framework is proper

in the part of records respectability and greater lower priced in the aspect of economic because of

the cost associated with repetitive frames.

But because of the leaving new propel device, this is less high priced at the price while the

problem of velocity and talent represented, the decentralized database has advanced as a decision.

From not unusual sense in the gift enterprise putting, a decentralized database offers higher speed

and adaptability. Business institutions as of now encompass a significant degree or methods, as an

example, bargain conveyance, discrete assembling, retail, and expert administrations operations,

financials, human asset and some more. Each of these business viewpoints promises their

particular excessive volumes of information.

On the off hazard that the extra a part of the statistics yields from these zones sorted by way of

one focal database, the likelihood of unhappiness is conceivably high. What's more, while a

depression happens, the business process could forestall. At the factor whilst there's ceasing,

International Journal of Pure and Applied Mathematics Special Issue

1276

Page 3: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

3

irrespective of to what volume the length, it can imply misfortune in earnings and revenue for the

business enterprise.

Decentralizing the database by dividing it as indicated with the aid of a commercial enterprise or

stop-customer characterized department of understanding and having the possession moved to the

proprietors of the branch of intelligence can contend with the difficulty of database unhappiness

and enterprise stoppage.

Figure 1 Distributed DBMS

At the point when the database is decentralized, the every of the database segment might already

be capable of being overseen by a particular purchaser or collecting. For example, one database

might manage via the cash related gathering, another managerial accumulating, and afterward,

something left of the segments by the business, human asset, consumer connections, acquisition,

fabricating divisions et cetera relying upon the installation of the business enterprise.

With this form of putting, facts uprightness is probably preserved up greater properly considering

there will be an advanced cognizance of different's expectancies by way of every of the office. In

the case of something turns out poorly, it can be whatever however hard to pinpoint which

department brought on the difficulty

, and unique people or collecting can count on the legal responsibility.

This helps to store data with different for every file, that password will be generated by the data

owner. This made an online tutorial and training naturally with the description this will not let

down the data accessed by everyone only the referrals that to they should be the members of our

portal. This will give a peace mind to data owner and make them feel the data is safe in their

hands. It helps many cloud users by providing security and privacy protection for the data storing

by the data owner. With the access of cloud admin, only data will be saved, shared, edited and

deleted. With unknowing of key data can't be accessed.

Our major problem is defined, Cloud platform where any user can save their time and money in

purchasing servers and also free from power bills. With that amount of all expenditure in buying

and maintaining the server to store, they can buy memory space at a cheaper cost and can keep a

private server without any external storage units. But this made a conflict of security and privacy

even providing numerous advantages to users. The first battle is that, for example, cloud admin

accessing data without any permission of the data owner and can also sell the data, this raises the

issue of "SECURITY." In some situations, the data accessed by many of the users who need it and

who don't need it, and they are adapting to change the data as their own this raises the conflict of

"PRIVACY." These are the two problems which are dealing in this context.

To share the documents that were used to access the data by another user on a specific belong to

that group and helps in group learning approach. This results in finding the clarity on the topic

share. Even discussing the topics leads to more clarification this is focusing on the next section of

the document. Also categorizing the concepts will lead us to identify it more appropriately.

2. LITERATURE REVIEW

Due to the specificity of such records, accumulating and maintaining such information is a high

priced system, and furthermore, some of the statistics can be touchy. For example, sure activist

corporations won't want to launch their occasions to the majority, because of worries that large

agencies or oppressive governments may intervene and compromise their sports. Similarly, some

businesses may additionally favor holding their geo-tagged datasets private, and most effective on

hand to depended on subscribed customers, for the concern of backlash from greater conservative

International Journal of Pure and Applied Mathematics Special Issue

1277

Page 4: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

4

population businesses. It is therefore essential to guard the facts against the cloud service

company. Also, due to financial matters on behalf of the information owner, subscribing

customers may be billed for the service based on a pay-in keeping with-end result model.

It isn't always smooth to outline the term "knowledge" as it has exclusive meanings depending on

context. In the context of the enterprise or the private computer person, information tends to

connote possession of experienced "understanding" as well as ownership of actual records or

where to get it [26]. In philosophy, the concept of understanding is known as epistemology and

offers with such questions as for how tons understanding comes from experience or innate

reasoning ability; whether knowledge desires to be believed or can apparently be used; and how

expertise adjustments as new ideas approximately the identical set of statistics rise [26].

Knowledge control is An approach for the development of commercial enterprise system

performance [29]. Also, a know-how control system is most usually utilized in the business

enterprise in packages consisting of records systems, retail enterprise management, pc technology,

public policy and modern management. Also, commonplace agency departments for expertise

management structures include of human resources, enterprise approach and statistics era.

Moreover, knowledge management systems encompass procedures to seize, distribute, and

efficiently use know-how [30]. Knowledge acquisition is the system of improvement and advent

of insights, abilities, and relationships [31]. On the alternative hand, Knowledge sharing is

disseminating and making to had what already regarded. However, Knowledge usage consists of

studies, scholarly, and programmatic intervention activities aimed at increasing using

understanding to solve problems [33].

Query processing that preserves each the statistics privateness of the owner and the query

privateness of the client is a brand new studies hassle. It shows increasing significance as cloud

computing drives more celebrated agencies to outsource their data and querying offerings.

However, most current studies, along with the ones on records outsourcing, cope with the

information privateness and query privateness one after the other and can't be carried out to this

problem.

Mobile devices with geo-positioning skills (e.G., GPS) enable users to get admission to data that

is relevant to their gift location. Such facts may be touchy due to their contents. Users send their

modern-day area as the question parameter and desire to get hold. As a result of the closest POIs,

i.E., nearest-friends (NNs). But usual statistics owners do not have the technical means to assist

processing queries on a large scale so that they outsource information storage and querying to a

cloud provider. Many such cloud carriers exist who provide influential garage and computational

infrastructures at low cost. However, cloud carriers aren't entirely trusted and commonly behave

in a sincere-however-curious fashion. Correctly, they observe the protocol to answer queries

correctly, however, also, they accumulate the locations of the POIs and the subscribers for

different functions. Disclosure of consumer places ends in privateness violations and might deter

subscribers from the usage of the service altogether. In this paper, we advise a circle of relatives

of strategies that permit processing of NN queries in untrusted outsourced surroundings, while at

the same time protecting each the POI and querying users' positions. Our techniques depend upon

mutable order retaining encoding (mOPE), the only cozy order-retaining encryption approach

recognized to-date. We additionally provide overall performance optimizations to lower the

computational value inherent to processing on encrypted data, and we keep in mind the case of

incrementally updating datasets. We gift an intensive performance assessment of our strategies to

illustrate their viability in exercise.

Also, Grid computing is applying the assets of many computers in a community to an unmarried

trouble at the identical time - usually to a systematic or technical hassle that requires a splendid

variety of computer processing cycles or get right of entry to vast amounts of records [10].

Service-orientated

Architecture (SOA) is a software program layout and software program architecture layout

sample based entirely on beautiful portions of software providing application functionality as

offerings to other packages [6]. Moreover, this referred to as service orientation.

Also, it is independent of any seller, product or generation [10]. Service-Oriented Architecture

makes it easy for computers connected over a network to cooperate [6]. Private cloud is reachable

from an intranet, internally hosted, and used by a single corporation [11]. Community cloud has

International Journal of Pure and Applied Mathematics Special Issue

1278

Page 5: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

5

infrastructure reachable to a specific network.

In cloud computing, statistics proprietor use facts and querying offerings for outsourcing on the

cloud records. During this process, information is the separate and personal asset of the data

owner, for this reason, that should be blanketed towards cloud and querying consumer. A query

that fired by using the purchaser might also expose the touchy details/information of the

purchaser.

Hence ought to be covered in cloud and from facts owners. Therefore, one of the essential

problem in cloud computing is to defend both, statistics privateness and query privacy among the

information proprietor, the client, and the cloud refers Fig- 1. The social networking is one of the

growing sectors facing such kind of privateness problem [2]. Cloud Computing is the new

platform for deploying, managing, and presenting the solution to the diverse types of a garage,

platform issues the use of Internet-based total processing. However, it is the sensitive issue to add

our records to the cloud because facts privacy is the big problem and foremost trouble of

protection. Sensitive facts need to encrypted before outsourcing, which creates the adequate

infrastructure.

The services consisting of Google Docs, Amazon EC2, Microsoft Azure, and Online report

storage, etc. Are the examples of cloud computing and they're widely utilized by many humans

international. Facts utilization offerings and this is the massive tough task. One of the techniques

of retrieval known as Symmetric Searchable Encryption (SSE) of encrypted records on the cloud

however nonetheless there's leakage of facts privateness. Secure server –aspect ranking, which

primarily based on the order-preserving Encryption (OPE), additionally includes the similarity

relevance and robustness [3].

For the privateness of the records, numerous fashionable answer in current research papers are

deposited to show observe on the information privacy, the most widespread answer in recently

achieved research papers is encryption. It way facts stored service company ought to be encrypted

to keep away from information leakage in the cloud. Agrawal et al. [4] proposed one of the

solutions with the intention to order retaining encryption scheme (OPES) using which, indexes

can be constructed without delay on cipher textual content. The several SQL statements which

include MAX, MIN, COUNT, GROUP BY and ORDER BY can then be rewritten and processed

over the encrypted records.

But OPES does no longer guide SUM or AVG statements, in case of SUM and AVG original

records ought to decrypted first. In personal Information retrieval (PIR) for hiding a user's query

entirely and offering robust privateness and confidentiality, question anonymisation commonly

uses okay-Anonymity [5] and its variations to mix the consumer's question with different noisy

query facts. In [6], [7], user privateness and records privacy is considered collectively.

Yonghong Yu and WenyangBai mentioned how to enforce statistics privacy and person privacy

over outsourced database provider in [8]. Hu et al. [9] proposed one in all the answer based on

secure traversal framework and privacy homomorphism primarily based encryption scheme.

Moreover, there are five crucial characteristics of cloud computing: on-demand self-provider,

large community get right of entry to, useful resource pooling, rapid elasticity, and measured

provider [14]. Users of On-call for self-carrier can provision cloud computing assets without

requiring human interplay, frequently executed even though an Internet-based self-service portal

(control console) [15]. In comparison, the vast network gets admission to approach that cloud

computing sources are handy over the web, supporting heterogeneous customer platforms along

with cell devices and workstations [15].

But useful resource pooling is the service multiple customers from the identical bodily assets,

through securely isolating the resources on relevant degree [15]. And rapid elasticity is the

sources that provisioned and released on-demand and automated based on triggers or parameters

[15]. Resource utilization is monitored, measured, and reported (billed) transparently primarily

based on usage by measured carrier [16]. Furthermore, cloud computing is an awful lot extra than

simply virtualization. It's virtually approximately utilizing era "as a service."

Infrastructure as a carrier, Platform as a provider, and Software as a service [17]. Infrastructure as

a service (IaaS) affords to get admission to server hardware, garage, network capability, and

different essential computing assets [17]. And Platform as a carrier (PaaS) affords to get entry to

simple operating software and offerings to expand and use purchaser-created software program

International Journal of Pure and Applied Mathematics Special Issue

1279

Page 6: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

6

packages [18]. Finally, Software as a provider (SaaS) presents integrated get right of entry to a

provider’s software programs [17].

3. METHODOLOGY

Our methodology is comprised of two different security schemes to access data in the cloud. They

are 1. KNN based authorized the search for data and 2. Encryption based data storage and decrypt

the data shared after acquiring.

3.1 KNN based authorization for searching data

In this segment of the thesis, we advocate a circle of relatives strategies that allow processing of

NN queries in an untrusted out-sourced surroundings, while at the identical time protecting both

the POI and querying customers positions. Our techniques rely on mutable order-preserving

encoding(mOPE), which ensures in distinguishing below ordered chosen-plaintext assault(IND-

OCPA).

We additionally provide security with performance optimizations to decrease the computational

value inherent to process encrypted facts, and we do not forget the case of dynamic updating

datasets. Inspired with the aid of previous paintings in that delivered together encryption and

geometric facts systems that enable efficient NN question processing, we investigate the use of

VORONOI diagrams and Delaunay triangulations to resolve the trouble of cozy outsourced KNN

queries.

We emphasize that preceding work assumed that the contents of the VORONOI diagrams are to

be had to the cloud issuer in plaintext, whereas in our case the processing is done entirely on

ciphertexts, which is the most significant problem.

FIGURE 2 Block Diagram for user search process

Our proposing methods nearest-neighbor algorithm performs search processing on top of

encrypted information, and for this reason, they're inherently pricey. It is an essential fact that

accomplishing security by processing on encrypted records comes at the cost of sizeable

computational overhead. Next, we endorse optimizations that intention at lowering this fee.

A secure protocol for processing k-nearest-neighbor queries (KNN) on R-tree index given. In the

authors following work [7], they included indexing strategies with comfortable multiparty

computation (SMC) based on protocols only, that helps in constructing a relaxed index traversal

framework. In this structure, the service provider can't trace the index traversal route of a question

for the duration of assessment, and as a result, keep the privacy of users.

Their protocols for a question are complex and challenging to implement. To resolve security

issue in processing the data results in query passing, unique techniques executed, e.g., Public facts

column and private information column are applied using hashing in. But be part of via hashing is

unable to retrieve other particular as well as application data columns. Some time before a paper

published with the aid of researchers proposes kNN queries by way of processing personal &

remotely the use of homomorphism encryption [2]. Theoretical protocols the use of

homomorphism encryption suggested to manner non-public report seek with the aid of specific

International Journal of Pure and Applied Mathematics Special Issue

1280

Page 7: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

7

keywords in a line of files.

These protocols are nevertheless too high-priced to apply almost, and that they carry out most

effective approximated seek. Finally, we are not concerned with a secured question for processing

on outsourced encrypted facts even though our statistics tokenization inspires the effects of search

concept in work from that area [12].Our method can also observe to protect question privacy in

outsource eventualities.

A spatial database is a database this is optimized to keep and question facts that represent gadgets

described in a geometric area. Most spatial databases permit serving simple geometric gadgets

together with points, traces, and polygons. Some spatial databases cope with greater complicated

systems inclusive of 3-D objects, topological coverages, linear networks, and TINs. While regular

databases are designed to manipulate various numeric and character styles of facts, additional

capability needs to be delivered for databases to method spatial information types efficaciously.

As cited previously, the dataset of points of interest represents a crucial asset for the data

proprietor and a vital supply of revenue. Therefore, the coordinates of the points need not be

recognized by the server. We expect an honest-however-curious cloud service provider. In this

model, the server executes the given protocol for processing kNN queries, but can even attempt to

infer the vicinity of the data factors. It is accordingly essential to encrypt all statistics stored and

processed on the server.

Figure 3 Block Diagram of Proposing Scheme

To allow question assessment, a unique type of encryption that allows processing on ciphertexts is

vital. MOPE is a provably comfy order-retaining encryption approach, and our technologies

inherit the IND-OCPA protection guarantee against the sincere-but-curious server provided by

using mOPE. Furthermore, we expect that there is no conspiracy among the clients and server,

and the clients will not divulge to the server the encryption keys.

Although the cloud issuer typically possesses efficient computational sources, processing on

encrypted data incurs a full-size processing overhead, so overall performance concerns on the

cloud server constitute a vital. The patron has a question point Qand desires to find the factor's

dearest pals.

The consumer sends its encrypted vicinity query to the server and gets nearest neighbors as a

result. Note that, because of the truth that the statistics factors are encrypted, the purchaser also

International Journal of Pure and Applied Mathematics Special Issue

1281

Page 8: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

8

needs to perform a small part of the question processing itself, using helping with positive steps.

Figure 4 K-NN Clustering diagram

Data Owner sends to Server the encoded VORONOI cell vertices coordinates, MBR boundaries

for each cell, encoded right-hand side, and encrypted, for each cell edge. The client sends its

encoded query point to the Server.

To support secure KNN queries, where k is the fixed value for all querying users, we could extend

the VD-1NN method from by generating order-K VORONOI diagrams.However, this technique,

which we call VD-KNN, has several serious drawbacks:

(1) The complexity of making order- k VORONOI diagrams are either depending on the

approach used or significantly higher than for order-1 VORONOI diagrams.

(2) The number of VORONOI cells in order- k-VORONOI diagram, or roughly when k<<n.

That leads to high data encryption overhead at the data owner, as well as prohibitively high query

processing time at the server (a k-fold increase compared to VD-1NN). Motivated by these

limitations of VD-kNN, we first introduce a secure distance comparison method (SDCM).

Next, we devise Basic kNN (BkNN), a protocol that uses SDCM as the building block, and

answers kNN queries using constant comparisons among pairs of data points. BkNN is just an

auxiliary scheme, costly in itself, but it represents the starting point for Triangulation kNN

(TkNN), presented TkNN builds on the BkNN concept and returns exact results for k=1. For k>1,

it is an approximate method that provides high-precision kNN results with significantly lower

costs

⟩.

3.2 Data encryption and decryption

3.2.1 Requirements Addressed

Encryption components ought to mirror the business/use necessities. Ordinarily, information must

be overseen contrastingly relying upon its state or area, regardless of whether very still, in travel,

or in the Cloud. While the security of information in travel profits by developing encryption

instruments like SSL, securing information very still while guaranteeing its accessibility exhibits

other and continuous difficulties. For organized storage, one of the additionally tricky issues is the

way to encode information while holding the capacity to peruse files and critical fields which may

be in plaintext. For all information, the objective is to empower secure access and cooperation

while ensuring against unapproved get.

3.2.2 Data Availability

Utilization of a cloud-encryption benefit introduces conceivably enormous difficulties for

information accessibility, which ought to precisely considered while executing or choosing a

cloud benefit. In particular, a cloud encryption benefit must oversee and escrow keys, and give

tight controls over access to those keys.

Albeit all cloud administrations must consider accessibility (and execution) as a part of

management and conveyance, the issue is particularly intense for cloud encryption

administrations, as poor execution or absence of authority would possibly affect a substantial

number of different powers, both cloud-construct and concerning premises. In any event, debacle

International Journal of Pure and Applied Mathematics Special Issue

1282

Page 9: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

9

recuperation and bomb over choices ought to be a standard piece of any encryption benefit

offered through the cloud.

3.2.3 Key Management

The critical administration is the most complicated piece of any security framework managing

encryption of information. An association must characterize its cryptographic security and key

lifecycle administration arrangement. Access to these cryptographic keys ought to be conceded to

approved clients just and denied when those clients never again require getting.

Cryptographic keys for encryption of information ought producing security. This may incorporate

the utilization of a suitably robust arbitrary number generator (RNG). Cryptographic keys ought

to never be transmitted free and ought to be put away inside a protected component, for example,

a savvy card, or an administration with the equipment security module (HSM).

It ought to be conceivable to escrow keys utilized for information encryption. A few choices for

the administration and capacity of encryption keys ought to be accessible. For instance,

encryption keys put away on the same server from information, on an unexpected server in

comparison to the report, or assigned to the proprietor of the information or an outside supplier of

such administrations. Key Management Service ought to be agreeable with then-current norms,

for example, NIST Special Publication 800-57 sections 1, 2, and 3.

Nonetheless, given the Separation of Duties security standard, essential administration in a perfect

world ought to be isolated from the cloud supplier facilitating the information. This gives the best

security against both an outside break of the specialist co-op and also an assault beginning from

an advantaged client/worker of the supplier.

One outline to consider is a Remote Key Management Service where the client keeps up the KMS

or Enterprise Key Management (EKM) arrangement on-introduce. Many enterprises effectively

possess, keep up and bolster their KMS. In many cases, the KMS utilizes an HSM for key age and

security. While such arrangements can include the Cloud Provider for encryption/decoding

administrations, the Cloud Provider may not be giving a full KMS as an administration.

Customer Side Key Management puts the client in total control of encryption/decoding keys. The

Cloud Provider does not manage keys, has irrelevant information about clients, can't decode client

information, and encourages the capacity of scrambled data. This kind of arrangement can be

utilized by distributed storage and SaaS suppliers and also IaaS suppliers.

Key renouncement strategy and related systems are essential for all key administration models.

The key administration should empower key repudiation. For instance, when a worker leaves the

association or changes work, the key management should repudiate all key(s) to which s/he never

again needs to get.

3.2.4 Data in the Cloud

Encryption of a database ought not unfavorably influence the capacity of uses to utilize this

information. If so wanted by the client, the CSP ought to enable data to encoded in an

arrangement protecting manner.

When information expelled from distributed storage, the CSP must guarantee that it legitimately

cleansed, and for the situation that the CSP is likewise overseeing cryptographic keys, that all

related keys decimated as per affirmed key lifecycle administration norms and rules

The devastation of information infers taking all proper measure to guarantee that information can't

get by anyone in future. All hints of the information, incorporating any of the logs, ought to be

expelled from the framework. It ought not to be conceivable to increase any future access to the

erased information. Cryptographic keys utilized amid encryption of information ought to likewise

crushed.

3.2.5 Securing the Client

Distributed computing administrations that store scrambled information are influenced

conceivable by a blend of server and customer to side segments. There frequently is a far more

prominent accentuation on secure server-side programming and procedures while customer parts

are disregarded and conceivably might be defenseless against bargain.

This is particularly essential as an ever-increasing number of clients depend on individual

customer gadgets, for example, advanced mobile phones for getting to cloud administrations.

These devices run applications that tout usability and may include security as a bit of hindsight. A

secondary passage Trojan, keystroke lumberjack, or some other sort of malevolent programming

International Journal of Pure and Applied Mathematics Special Issue

1283

Page 10: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

10

running on a customer gadget can promptly undermine the general security of distributed storage

administrations.

As a result of their broad utility and all-inclusive acknowledgment as an accepted customer

application, web programs are a key component in giving customer side access to distributed

computing administrations, for example, information encryption. The open design of web

programs can present security issues, enabling client sessions to captured and encoded cloud

information can be traded off. Sufficient measures must be taken to verify clients in a safe way to

shield their online session from vindictive utilize.

3.2.6 Policy and Enforcement

Necessities for encryption to comply with constructed up safety arrangement do not stop at the

on-start border. As it identifies with the utilization of cloud blessings, the problems of what is

encoded, and when, must be tended to add to on-start strategies via the muse of document and

statistics arrangement structures. This order could then be capable of being actualized interior data

paintings methods making use of arrangements, for instance, DLP which could distinguish

strategy infringement and afterward implement appropriate utilization of facts.

The problem of ways information scrambled within the cloud have to likewise alter nicely with an

on-start approach. Approaches and the going with requirement measures need to reach out to

cover facts as it movements to and from cloud suppliers to guarantee that the use of encryption

continues meeting all instructions for statistics insurance.

3.2.7 Data Integrity

The utilization of statistics encryption on my own won't supply good enough affirmation that

encoded data has not been changed, in particular, if the encryption key's put away with the CSP.

Records put into the cloud for capacity might be prone to breaking or substitution, for this

situation, and encryption by myself can't perceive this. Joining information encryption with

trustworthiness securities, as an example, excellent marks can assure that records in the cloud

remain each non-public and actual. Where accessible, usage of depended on time have to take into

consideration via using time-stamped marks on facts.

Algorithm for data encryption with DES.

Input: Data to be encrypted (Di)

Step 1: Every 8th bit of the unknown key is an odd parity

Step 2: Remove parity based on permutations

i.e, i= first bit of last byte of 8 bytes

(Ki),K(i-8),….K(i+1), K((i+1)-8)…., K(i+2), K((i+2)-8),…

key permutated bits after removing parity bits

Step 3: Split keys into right block and left block for the remaining 36 bits

L(0)=P(1:28)

R(0)=P(29:56)

Step 4: For 1<=i<=16 (i.e ., 16 sub keys need to generate)

Step 5: Applying left circular shift to generate 16 sub keys

Step 6: L(i)=LS[i] L[i-1]

Step 7: R(i)= LS[i] R[i-1] //here LS is left shift

Step 8: K[i]=P2[C(i) D(i)]

Step 9: End for

Step 10: Process 64 data bits (db)

Step 11: Permutation of db result in

J= second bit of last byte of 8 bytes

Db= db(j) d(j-8) …. d(j+2) , db((j+2)-8) , ….

Step 12: Split DB into L and R blocks

dl(0)=dp(1:32)

dr(0)= dp(33:64)[i-1]

Step 13: For i<=1 <=16

Step 14: dl[i]=R[i-1]

Step 15: dr[i]=L[i-1] XOR F(R[i-1],k[i])

Step 16: Chipper text is cb=PP[(drc16) d(c16)]

International Journal of Pure and Applied Mathematics Special Issue

1284

Page 11: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

11

Cryptography is connected to serve secure advanced information. These days, there are numerous

sorts of encryption and a significant portion of them require a mystery key to encode digital

information. In the wake of applying a cryptography calculation to our advanced data, others can't

recapture the first information effortlessly without the mystery key. At that point, the private data

are under assurance.

Bruce Schneier outlined the Blowfish calculation in 1993. It is a symmetric square figure, and

each piece is 64 bits. The mystery key of Blowfish cryptography ranges from 32 bits to 448 bits.

BOWL FISH ENCRYPTION & DECRYPTION ALGORITHM:

Blowfish has analyzed for a long time. Serge Vaudenay has inspected powerless keys in

Blowfish. Vincent Rijmen's Ph.D. paper incorporates a moment arrange a differential assault on

4-round Blowfish [2]. The key of the Blowfish calculation is 448 bits, so it requires 2448 mixes to

look at all keys.

The Blowfish calculation has many points of interest. It is reasonable and proficient for

equipment usage.

STEP 1: uint32_t P[18];

STEP 2: uint32_t S[4][256];

STEP 3: uint32_t f (uint32_t x) {

STEP 4: uint32_t h = S[0][x >> 24] + S[1][x >> 16 & 0xff];

STEP 5: return ( h ^ S[2][x >> 8 & 0xff] ) + S[3][x & 0xff];

STEP 6: void encrypt (uint32_t & L, uint32_t & R) {

STEP 7: for (int i=0 ; i<16 ; i += 2) {

STEP 8: L ^= P[i];

STEP 9: R ^= f(L);

STEP 10: R ^= P[i+1];

STEP 11: L ^= f(R);

STEP 12: END FOR

STEP 13: L ^= P[16];

STEP 14: R ^= P[17];

STEP 15: swap (L, R);

STEP 16: END ENCRYPTION

STEP 17: void decrypt (uint32_t & L, uint32_t & R) {

STEP 18: for (int i=16 ; i > 0 ; i -= 2) {

STEP 19: L ^= P[i+1];

STEP 20: R ^= f(L);

STEP 21: R ^= P[i];

STEP 22: L ^= f(R);

STEP 23: END FOR DECRYPTION

STEP 24: L ^= P[1];

STEP 25: R ^= P[0];

STEP 26: swap (L, R);

STEP 27: END FOR

KEY GENERATION

STEP 1: {initializing the P-array, S-boxes by derived values from pi;

STEP 2: for (int i=0 ; i<18 ; ++i)

STEP 3: P[i] ^= key[i % keylen];

STEP 4: uint32_t L = 0, R = 0;

STEP 5: for (int i=0 ; i<18 ; i+=2) {

STEP 6: encrypt (L, R);

STEP 7: P[i] = L; P[i+1] = R;

STEP 8: END FOR

STEP 9: for (int i=0 ; i<4 ; ++i)

STEP 10: for (int j=0 ; j<256; j+=2) {

STEP 11: encrypt (L, R);

STEP 12: S[i][j] = L; S[i][j+1] = R;

International Journal of Pure and Applied Mathematics Special Issue

1285

Page 12: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

12

STEP 13: END FOR

STEP 14: END FOR

RESULTS

Numerical Results

Figure 5 Chart for Accuracy.

Tabular RESULTS FOR ACCURACY VERSUS VARIOUS CLUSTER

Table 1: Different clusters versus accuracy

CLUSTERS K-NN K-NN DES K-NN Blow

Fish

3 0.8 0.9 0.95

5 0.8 0.85 0.93

7 0.75 0.83 0.92

9 0.73 0.8 0.89

10 0.72 0.78 0.84

20 0.7 0.75 0.83

30 0.65 0.75 0.82

CONCLUSION

Procuring a proficient scrambling plan with a secured information getting better plan offers a

catchment proof data to examinations and this aide in giving security to information as well as

aides in obtaining the records fast concerning time and execution in a disbursed garage. In this

way, the chance of information hacking and passing inquiry became explicitly simple in these

fields.

Decentralized get right of entry to control method with mysterious validation, which offers patron

renouncement and prevents replay attacks. The cloud does not understand the character of the

client who shops information, yet only exams the consumer's certifications. Enter conveyance is

done decentralized. One impediment is that the cloud is aware of the entrance arrangement for

every document placed away in the cloud. In future, we'd want to hide the tendencies and get

entry to approach of a customer.

Result broadening has pulled in unusual consideration. Be that as it can, maximum go with the

flow have a look at addresses the static variant of the difficulty. In this paper, I pondered the

enlargement trouble in a dynamic putting wherein the matters to be stronger trade after some time.

The proposed approach is a report based method that permits the incremental evaluation of the

broadened sets to reflect element refreshes. The proposed arrangement relies upon on cover

bushes. To develop the proposed method becoming a member of first-rate range with

significance.

International Journal of Pure and Applied Mathematics Special Issue

1286

Page 13: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

13

The front approach for each report positioned away in the cloud, and future paintings may

additionally conceal the detail or attributes and get admission to the association of client. One

obstacle is that the cloud knows the doorway method for each record put away in the cloud. In

destiny, we would want to conceal the traits and get entry to the method of a purchaser. Way to

the cloud completes the maximum high-priced operations inclusive of pairings and. On the off

chance that we consider the calculation heap of customer amid study we see that our plan has

practically equal fees.

In future the file gets to may be actualized with Multi-Authority based Attribute-based

Encryption. Utilizing the gadget, it could keep away from the number of incorrect hits amid

validation. Make an arbitrary postponement for validation, so the programmer can confound to

distinguish the calculation.

REFERENCES

[1] Yousef Elmehdwi, Bharath K. Samanthula and Wei Jiang, “Secure k-Nearest Neighbor Query

over Encrypted Data in Outsourced Environments”,

[2] Hu, Haibo, et al. "Processing private queries over untrusted data cloud through privacy

homomorphism." Data Engineering (ICDE), 2011 IEEE 27th International Conference on. IEEE,

2011.

[3] Nandhini, N., and P. G. Kathiravan. "An Efficient Retrieval of Encrypted Data In Cloud

Computing."

[4] Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and YirongXu. Order preserving

encryption for numeric data. In Proceedings of the 2004 ACM SIGMOD international conference

on Management of data, SIGMOD ’04,pages 563–574, New York, NY, USA, 2004. ACM.

[5] P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity

and its enforcement through generalization and suppression. Technical report, 1998.

[6] TingjianGe, Stanley B. Zdonik, and Stanley B. Zdonik. Answering aggregation queries in a

secure system model. In VLDB, pages 519–530, 2007.

[7] Haibo Hu and JianliangXu. Non-exposure location anonymity. In Yannis E. Ioannidis,

DikLun Lee, and Raymond T. Ng, editors, ICDE, pages 1120–1131. IEEE,2009.

[8] Yonghong Yu and WenyangBai. Enforcing data privacy and user privacy over outsourced

database service. JSW, 6(3):404–412, 2011.

[9] Hakan Hacgm, BalaIyer, and Sharad Mehrotra. Efficient execution of aggregation queries

over encrypted relational databases. In Yoon Joon Lee, Jianzhong Li, Kyu-Young Whang, and

Doheon Lee, editors, Database Systems forAdvanced Applications, volume 2973 of Lecture

Notesin Computer Science, pages 125–136. Springer Berlin Heidelberg, 2004.

[10] Varghese, Jiss, and Lisha Varghese. "Homomorphic Encryption for Multi-keyword

based Search and Retrieval over Encrypted Data."

[11] C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC ’09:

Proceedings of the 41st annual ACM symposium on Theory of computing, pages 169– 178, 2009.

[12] Josep Domingo-Ferrer. A provably secure additive and multiplicative privacy

homomorphism. In Proc. 5th International Conference on Information Security, 2002

[13] Wong, K.Y. and E. Aspinwall; Characterizing knowledge management in the small

business environment, Journal of Knowledge Management, vol. 8,pp. 44-61, 2004.

[14] Jay Liebowitz, Strategic Intelligence: Business Intelligence, Competitive Intelligence,

and Knowledge Management, Auerbach Publications, 2006.

[15] Maier, R., Knowledge management systems, 3rd edition, Springer, 2007.

[16] I. Sriram and A. Khajeh-hosseini, Research Agenda in Cloud Technologies,

Methodology abs/1001.3, 2010.

[17] Foley, John. "Private Clouds Take Shape". InformationWeek. Retrieved 2010-08-22

[18] Rouse, Margaret. "What is public cloud?". Definition from Whatis.com. Retrieved 12

October 2014.

[19] Rouse, Margaret. "What is a multi-cloud strategy". Search Cloud Applications.

Retrieved 3 July 2014.

[20] "What is Cloud Computing?". Amazon Web Services. 2013-03-19. Retrieved 2013-

03-20.

International Journal of Pure and Applied Mathematics Special Issue

1287

Page 14: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

14

[21] "Defining 'Cloud Services' and "Cloud Computing"". IDC. 2008-09-23. Retrieved

2010-08-22.

[22] Danielson, Krissi (2008-03-26). "Distinguishing Cloud Computing from Utility

Computing". Ebizq.net. Retrieved 2010-08-22.

[23] Keep an eye on cloud computing, Amy Schurr, Network World, 2008-07-08, citing

the Gartner report, "Cloud Computing Confusion Leads to Opportunity". Retrieved 2009-09-11.

[24] Boniface, M. et al. (2010), Platform-as-a-Service Architecture for Real-Time Quality

of Service Management in Clouds, 5th International Conference on Internet and Web

Applications and Services (ICIW), Barcelona, Spain: IEEE, pp. 155–160,

doi:10.1109/ICIW.2010.91

[25] Mehmet Sabih AKSOY, Danah Algawiaz, " Knowledge Management in the Cloud:

Benefits and Risks" International Journal of Computer Applications Technology and Research

Volume 3– Issue 11, 718 - 720, 2014.

[26] Stanley Cavell, "Knowing and Acknowledging", Must We Mean What We Say?

(Cambridge University Press, 2002), 238–266.

[27] Drucker, P., The age of discontinuity: guidelines for our changing society. New York:

Harper & Row, 1969.

[28] Davenport, Thomas H. (1994). "Saving IT's Soul: Human Centered Information

Management". Harvard Business Review 72 (2): 119–131.

[29] Alavi, M. and Leidner, D., Review: knowledge management and knowledge

management systems: conceptual foundations and research issues, MIS Quarterly, Vol. 25 No. 1,

pp. 107-36, 2001.

[30] Gupta, Jatinder; Sharma, Sushil (2004). Creating Knowledge Based Organizations.

Boston: Idea Group Publishing. ISBN 1-59140-163-1.

[31] P. Mell, and T. Grance, Draft NIST Working Definition of Cloud Computing, 2009.

[32] Wong, K.Y. and E. Aspinwall; Characterizing knowledge management in the small

business environment, Journal of Knowledge Management, vol. 8, pp. 44-61, 2004.

[33] Jay Liebowitz, Strategic Intelligence: Business Intelligence, Competitive Intelligence,

and Knowledge Management, Auerbach Publications, 2006.

[34] "Towards Continuous Cloud Service Assurance for Critical Infrastructure IT". The

2nd International Conference on Future Internet of Things and Cloud (IEEE FiCloud-2014).

Retrieved 2014-08-15.

[35] Kemal A. Delic, Jeff A. Riley , Enterprise Knowledge Clouds: Next Generation KM

Systems?, International Conference on Information, Process, and Knowledge Management, 2009.

[36] Rosen K (2008) Elementary number theory and its applications. Reading. MA:

Addison-Wesley.

[37] Islam SH (2014) Design and analysis of an improved smart card based remote user

password authentication scheme. International Journal of Communication Systems.

[38] Islam SH, Biswas GP, Choo K-KR (2014) Cryptanalysis of an improved smart card-

based remote password authentication scheme. Information Sciences Letters 3(1): 35–40.

[39] Fan C-I, Chan Y-C, Zhang Z-K (2005) Robust remote authentication scheme with

smart cards. Computers and Security 24: 619–628.

[40] Messerges TS, Dabbish EA, Sloan RH (2012) Examining smart card security under

the threat of power analysis attacks. IEEE Transactions on Computers 51(5): 541–552.

[41] Joye M, Olivier F (2005) Side-channel analysis, Encyclopedia of Cryptography and

Security. Kluwer Academic Publishers, pp. 571–576.

[42] Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of

Advances in Cryptology (Crypto’99), LNCS, pp. 388–397.

[43] Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their

security analysis. In: Proceedings of Sixth IMA International Conference on Cryptography and

Coding, Cirencester, pp. 30–45.

[44] Islam SH, Biswas GP (2012) A pairing-free identity-based authenticated group key

agreement protocol for imbalanced mobile networks. Annals of telecommunication 67: 547–558.

International Journal of Pure and Applied Mathematics Special Issue

1288

Page 15: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

15

[45] Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual

authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.

Journal of Systems and Software 84 (11): 1892–1898.

International Journal of Pure and Applied Mathematics Special Issue

1289

Page 16: DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS PROTECTION · 2018-03-15 · 1 DECENTRALIZATION FOR KNOWLEDGE SHARING IN CLOUD ENVIRONMENT FOR ANONYMOUS

1290