Secure Data Forwarding Using KAC

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

Cloud storage is nowadays very popular storage system. Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can provide good accessibility, reliability, strong protection, disaster recovery, and lowest cost. here describes how securely ,efficiently and flexibly sharing data with others in cloud storage. In modern cryptography, a primary problem often studied is that leveraging the secrecy of a small piece of knowledge into the ability to perform the cryptographic functions (e.g., encryption, authentication) multiple times making a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. This problem is solved by introducing a special type of public-key encryption which is called as key-aggregate cryptosystem (KAC).KAC produces constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. Any set of secret keys can be aggregated and make them as single key, which encompasses power of all the keys being aggregated. This aggregate key can be sent to the others for decryption of ciphertext set. The remaining encrypted files outside the set are remains confidential and secure. This compact aggregate key can be conveniently sent to others or to be stored in a smartcard with very limited storage. This scheme give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Protection of Private Data in Association Rule Mining

"Today, in the computerized world there is huge requirement of storing data very securely. So this project is mainly based on providing security to the organizations data on the outsourced databases. For example, in clou...

Effect of Heat Transfer in a Circular Tube by Using Different Surface Texture

Experimental investigation has been carried out to study the effect of thermal enhancement factor, heat transfer and friction factor in a smooth tube and two different test tube having internal threads of pitch (p=1.78mm...

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Today-s information security threats are increasing in numbers and severity but diversity of network and information technology is increasing exponentially. So it is a challenge for small and medium enterprises, those wh...

Implementation of Highly Secured Log Management System over Cloud

A log is an assortment of record of events that happens at an organization containing systems and network. These logs are very important for any organization, as a result of log file can in a position to record all user...

RTL Design and FPGA Implementation of Canny Edge Detector with Real Time Threshold Adjustment Capability

The Canny edge detector is an edge detection operator detect a wide range of edges in images. Canny edge detector is read both column and rows pixels in images this is extra feature we are added in our article. Canny Ed...

Download PDF file
  • EP ID EP356211
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

(2015). Secure Data Forwarding Using KAC. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356211