Secure Data Forwarding Using KAC

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

Cloud storage is nowadays very popular storage system. Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can provide good accessibility, reliability, strong protection, disaster recovery, and lowest cost. here describes how securely ,efficiently and flexibly sharing data with others in cloud storage. In modern cryptography, a primary problem often studied is that leveraging the secrecy of a small piece of knowledge into the ability to perform the cryptographic functions (e.g., encryption, authentication) multiple times making a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. This problem is solved by introducing a special type of public-key encryption which is called as key-aggregate cryptosystem (KAC).KAC produces constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. Any set of secret keys can be aggregated and make them as single key, which encompasses power of all the keys being aggregated. This aggregate key can be sent to the others for decryption of ciphertext set. The remaining encrypted files outside the set are remains confidential and secure. This compact aggregate key can be conveniently sent to others or to be stored in a smartcard with very limited storage. This scheme give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Multimodality Esthetic Management - A Case Report

"Abstract The successful outcome of root canal therapy is related to the ability to negotiate the canal to its apical terminus, allowing thorough debridement, disinfection, and obturation of the prepared canal space. In...

Temperature Dependence DC Conductivity in Nanostructured Alumina Filler Incorporated Polycarbonate Matrix

"Abstract: The paper describes temperature dependence of DC conductivity of polycarbonate matrix materials in which nano-structured amorphous alumina has been incorporated as a filler in certain commercial grades of pol...

Larvicidal Potential of Commiphora swynnertonii (Burtt) Stem Bark Extracts against Anopheles gambiae ss, Culex quinquefasciatus Say and Aedes aegypti L

Petroleum ether, ethyl acetate and methanol stem bark extracts of Commiphora swynnertonii were evaluated for larvicidal potential against laboratory reared late third stage instar of mosquito namely, Anopheles gambiae ss...

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of t...

A Comparative Study of Acute Verses Chronic Cholecystitis Operated Laperoscopically

Objective:A prospective randomized study was undertaken to compare effects of laparoscopic surgery for acute versus chronic cholecystitis. Method:During a period of 2.5 years 60 patients of which 30 having acute and anot...

Download PDF file
  • EP ID EP356211
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

(2015). Secure Data Forwarding Using KAC. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk/articles/-A-356211