Extended Cryptographic Mechanism for Secure and Scalable Data Sharing in Cloud using Multiple Keys
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Cloud computing technology is widely used now-a-days. Data sharing is an important functionality in cloud storage. Data can be outsourced on cloud and can access easily. Different users can share that data through different virtual machines but present on single physical machine. But there is one loop hole in this i.e users don’t have physical control over the outsourced data. In this project, we show how to securely, efficiently, and flexibly share data with others in cloud storage. The data owner can share the data to other users in safe way using cryptography. So sender encrypts data and uploads it on cloud. Different encryption and decryption keys are generated for different data. The encryption and decryption keys are different for different set of data. Only those set of decryption keys are shared that the selected data can be decrypted. Here a public-key cryptosystems produces a ciphertext which is of constant size so that delegation of decryption rights for any set of ciphertexts is possible. One can combine a set of secret keys to form a single key of small size which has the power of all the keys being combined. This compact aggregate key of constant size can be efficiently sent to others via secure channel like email or can be stored in a smart card.
Authors and Affiliations
Swati Kutke, Shraddha Karmase, Prachi Bodake, Vrushali Tajane
AAN Based Hybrid Active Power Filter for Power Quality Improvement
The Active filtering of electric power has now turned into a develop innovation for consonant and receptive power pay in two-wire (single stage), three-wire (three stage without nonpartisan), and four-wire (three stage...
Network Intrusion Detection Using Machine Learning in Vanets: A Review
Vehicular Ad-hoc Network (VANETs) aids the vehicles to form a self-organized network in the absence of centralized infrastructure. It is the constituent of MANET and supports intelligent transport system (ITS). Each nod...
Chemical Computing
Chemical Computing is based upon the flow of electrons through which one can achieve the same result as that of a working computer. It involves the use of the Belousov–Zhabotinsky reaction in which the semi solid soup l...
slugHierarchical Power and Activity Analysis of an Clock Gated ALU
System-level or architectural-level power analysis is an important phase of SoC or NoC, to estimate and evaluate power at the early stage of the design phase. Power at the hierarchical level depends on the lower-level d...
Distributed Java Applications
This paper presents a new Java oriented monitoring infrastructure that enables tools to observe, analyze and manipulate the execution of distributed Java applications independent of implementation details like instrumen...