International Journal of Computer Science and Mobile Computing (IJCSMC)
The authors have a tendency to propose a secure multi-owner information sharing theme. It implies that any user within the cluster will firmly share information with others by the untrusted cloud. Their planned theme is in a position to support dynamic teams expeditiously. Specifically, new granted users will directly decipher information files uploaded before their participation while not contacting with information homeowners. User revocation is often simply achieved through a unique revocation list while not change the key keys of the remaining users. The dimensions and computation overhead of encoding area unit constant and freelance with the amount of revoked users.