A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts is possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Authors and Affiliations
Nadendla Siva Rama Krishna| M.Tech (CSE), Usha Rama College of Engineering and Technology, A.P., India, Y V V N Vara Prasd| Associate Professor, Dept. of Information Technology, Usha Rama College of Engineering and Technology, A.P., India
Effect Of Post Weld Heat Treatment On Micro Structure & Corrosion Behavior Of Aa 7075 Friction Stir Welds
Aluminum AL7075 alloy is an attractive option for aerospace components in naval and defence applications due to its corrosion resistance and absence of melting related problems. This project reports the effects of po...
Evaluate The Quality Of Marked Decrypted Image Quantitatively To Encrypted Images Using Rdh
Encryption is an effectual and popular means as it converts the original and significant content to incomprehensible one. Even though few RDH methods in encrypted images have been published yet there are some talente...
A Two Layer Secure Data Search with Bilinear Map and AES over Cloud
Multikeyword search over cloud is an interesting research issue in the field of knowledge and data engineering of cloud computing. Various researchers proposed various solutions to upload and process documents over c...
Strong Location and Data Privacy with User Unlinkability In Geo Location Based Services
Increasing smart phone usage in the world apple and android providing lots of apps for mobile users. Geosocial applications provide location services to provide social interface to the physical world. Due to lack of p...
A proficient document chain of importance characteristic based encryption plot is proposed in distributed computing. The layered access structures are coordinated into a solitary access structure, and after that, the...