Secure Data Sharing using Decoy Technology

Abstract

Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in cloud storage. Describe new public-key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. Show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. Cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. So provide formal security analysis of our schemes in the standard model and describe other application of our schemes. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. It Decoy technology provide security, Flexibility and confidentiality in data sharing.

Authors and Affiliations

Sonali Karale , Sachin Choudhari

Keywords

Related Articles

Network Capacity Improvement through Efficient Data Delivery in Mobile Ad-Hoc Networks

Mobile Ad Hoc networks are being increasingly used in wireless communication with many technological enhancements. One of the major issues in such an infrastructure less network is the delivery of the data packets in an...

SIGNIFICANCE OF WEB USAGE MINING IN MACHINE STUDY 

The WEB has been provided that a crucial and essential platform for receiving data and circularize data as well as interacting with society on the web. With its astronomical growth over the past decade, the web becomes v...

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...

An Approach to Improve the Performance of Insertion Sort Algorithm

Sorting is a fundamental operation in computer science. Sorting means rearranging data in some order, such as ascending, descending with numerical data or alphabetically with character data. There are many sorting algori...

Algorithms for Mining Association Rules: An Overview

In this paper, we provide the basic concepts about association rule mining and compared existing algorithms for association rule mining techniques. Of course, a single article cannot describe all the algorithms in detail...

Download PDF file
  • EP ID EP164814
  • DOI -
  • Views 138
  • Downloads 0

How To Cite

Sonali Karale, Sachin Choudhari (2016). Secure Data Sharing using Decoy Technology. International Journal of Computer Science & Engineering Technology, 7(9), 410-414. https://europub.co.uk/articles/-A-164814