Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

In Cloud Storage there is an important functionality called Data Sharing, but the query always present in every one’s mind is how to securely, efficiently, and flexibly share data with others in cloud storage. A new public-key cryptosystem is introduced to produce a constant size cipher texts such that efficient allocation of decryption rights for any set of cipher texts are possible. The uniqueness is that one can aggregate any set of secret keys and make them as compact as a single key, but surrounding the power of all the keys being aggregated. In supplementary terminology, the secret key owner can release a constant size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain private. This packed together aggregate key can be suitably sent to others or be stored in owner’s end to make the process more secure. Once the key is used by the owner then the formal key system change the key aggregate strategies and generates a new key for the data decryption, so that the user can access the remote resource with the help of generated key aggregate at single time only after that a new key will be generated for further use. In particular, this approach gives the first public key patient controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Disruptive Behaviour of the Readers: A Study of Mekelle University Main Campus Libraries (Ethiopia)

Disruptive behavior of the Library materials is a problem for libraries all over the world. Book mutilation and theft is intentional removal of books from the library in an unauthorized manner. Theft and mutilation strik...

Virulence and Control of Sporisorium ehrenbergii Vánky Races Attack Sorghum in Sohag Regions of Upper Egypt

Sporisorium ehrenbergii Vánky is the causal agent of long smut (LS) on sorghum in several African and Asian countries. For effective breeding programs to evolve LS resistant varieties to control this important disease, i...

Electro Magnetic Shielding Effectiveness of High Density Polyethylene Based Composite Materials

Our project is on Electromagnetic shielding effect of High density polyethylene based composite material and also try to analysis the mechanical properties of the materials. Composite making aims on light weight material...

A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++

This paper is a step toward developing an encryption system which can encrypt any text message securely. An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures .the mai...

Performance Comparison of L-MRC Receivers over Nakagami-M Fading and Hoyt Fading Channels

Performance Comparison of L-MRC Receivers over Nakagami-M Fading and Hoyt Fading Channels

Download PDF file
  • EP ID EP356249
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

(2015). Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk/articles/-A-356249