Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 3
Abstract
Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when users outsource their sensitive data in cloud servers. Secure and Efficient Data sharing in Cloud with single key size uses Key Aggregate cryptosystem (KAC) which is a public-key cryptosystem that produce constant-size ciphertexts for any set of secret key and make them compatible as single key as other data in cloud remains confidential. The limitation is that the number of ciphertext classes and the constant key size that makes the secret key predictable and data is unsecure. In this paper, the KAC-UC (KAC with Unbounded Ciphertext classes) scheme is proposed, in which the number of ciphertext classes in cloud storage is unbounded and the ciphertext classes can be extended by expanding the public and master key pair. The Variable size key is been used to securely share data that avoids the problem of being attacked and provides complexity for guessing the secret key. In addition, the ordered search is included to search the required data that is decrypted at the receiver side.
Authors and Affiliations
P. Kiruthika , S. Rajeevan , M. Manjunath , N. Geethanjali
MR Image Segmentation Methods:A Survey
In today’s modern medical image research, MR image segmentation is the most challenging task. The basis of MRI is the directional magnetic field, or moment, associated with charged particles in motion. These images are u...
Design and Implementation of Captcha with Click Point Authentication based on Hard AI Problems
A fundamental task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable Using hard AI problems for security is emerging as an exciting new paradigm, b...
Effort Reduction by Automatic Code Generation
The emergence of Unified Modelling Language (UML) as a standard for modelling systems has encouraged the use of automated software tools that facilitate the development process from analysis through coding. In our approa...
Privacy preservation for Neural Network Training
Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the...
Design of 2.4 GHz Oscillators In CMOS Technology
oscillators are essential components of RF circuits also the integral part of various electronic systems. An oscillator is an electronic device used for the purpose of generating a signal robust, high performance oscilla...