Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

In Cloud Storage there is an important functionality called Data Sharing, but the query always present in every one’s mind is how to securely, efficiently, and flexibly share data with others in cloud storage. A new public-key cryptosystem is introduced to produce a constant size cipher texts such that efficient allocation of decryption rights for any set of cipher texts are possible. The uniqueness is that one can aggregate any set of secret keys and make them as compact as a single key, but surrounding the power of all the keys being aggregated. In supplementary terminology, the secret key owner can release a constant size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain private. This packed together aggregate key can be suitably sent to others or be stored in owner’s end to make the process more secure. Once the key is used by the owner then the formal key system change the key aggregate strategies and generates a new key for the data decryption, so that the user can access the remote resource with the help of generated key aggregate at single time only after that a new key will be generated for further use. In particular, this approach gives the first public key patient controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Survey on Schedulers Optimization to Handle Multiple Jobs in Hadoop Cluster

An apache Hadoop project is a good platform that supports cost-effective such as commodity hardware implementation, with scalable infrastructure called Hadoop Distributed File System HDFS with parallel processing mechani...

Insulin and Blood Glucose Levels in Sudanese Women with Polycystic Ovary Syndrome

" Abstract: In view of the increasing number of patients with polycystic ovary syndrome (PCOS) among Sudanese women, and its impact in infertility and other complications, this study was conducted to determine and to ev...

Importance of Section 66A in Information Technology Act 2000

Section 66A defines the punishment for sending

Mineral Profile of Goats' Milk and its Relationship to the Surrounding Environment of El Salam Canal Area, East Suez Canal, Egypt

The content of selected macronutrients (N, P and K) and micronutrients (Fe, Mn, Zn, Cd and Pb) of soil, forage as well as goats' milk samples collected from El-Salam Canal area, East Suez Canal, Egypt were evaluated. Sam...

Longevity of Use of the Fixed Prosthetic Constructions in Relation to the Used Alloy

" Introduction: The process of mixing metals with non metals is called alloying, and the resulting mixture alloy. Alloys are composed of at least two elements, from which one must be metal. They are divided into alloys f...

Download PDF file
  • EP ID EP356249
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

(2015). Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356249