Secure Data Forwarding Using KAC

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

Cloud storage is nowadays very popular storage system. Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can provide good accessibility, reliability, strong protection, disaster recovery, and lowest cost. here describes how securely ,efficiently and flexibly sharing data with others in cloud storage. In modern cryptography, a primary problem often studied is that leveraging the secrecy of a small piece of knowledge into the ability to perform the cryptographic functions (e.g., encryption, authentication) multiple times making a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. This problem is solved by introducing a special type of public-key encryption which is called as key-aggregate cryptosystem (KAC).KAC produces constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. Any set of secret keys can be aggregated and make them as single key, which encompasses power of all the keys being aggregated. This aggregate key can be sent to the others for decryption of ciphertext set. The remaining encrypted files outside the set are remains confidential and secure. This compact aggregate key can be conveniently sent to others or to be stored in a smartcard with very limited storage. This scheme give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey

Location Based Application(LBA) provide location based services(LBS) by using queries called location based queries(LBQ). The result of these queries is based on location of mobile user. Privacy and Usability are two imp...

Distributed Cache Invalidation Method using Extended Adaptive Time to Live Mechanism for Cache Consistency in Wireless Mobile Network

DCIM is a Distributed Cache Invalidation Method is used for maintaining cache consistency in wireless mobile network. DCIM is analysed for assessing delay time and bandwidth gain and compared for polling time. DCIM is a...

RC Snubber Circuit Design for Thyristor using Turn-Off Model in Pspice

In this paper, we present a typical RC snubber circuit design procedure for a phase controlled thyristor by considering reverse recovery process. In the snubber circuit design of high power electronic circuits, the rever...

Distributed Controlled System for Industrial Application

Now days any manual application is quite difficult as compare to the automatic operation. And before the DCS system there was an introduction for the programmable logic controller in the industrial application. Automatio...

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Cloud is turning into a prevalent computing platform. Certainly, a question arises on the off chance that we can crush the scandalous DDoS attacks in a cloud environment. A DDoS attack can collapse the whole system in a...

Download PDF file
  • EP ID EP356211
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

(2015). Secure Data Forwarding Using KAC. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk/articles/-A-356211