Secure Data Sharing using Decoy Technology

Abstract

Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in cloud storage. Describe new public-key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. Show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. Cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. So provide formal security analysis of our schemes in the standard model and describe other application of our schemes. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. It Decoy technology provide security, Flexibility and confidentiality in data sharing.

Authors and Affiliations

Sonali Karale , Sachin Choudhari

Keywords

Related Articles

IMPACT AND UTILIZATION OF PROJECTORS IN HIGHER EDUCATION WITH LOW ENERGY CONSUMPTION AND LAST LONG BATTIES IN WSN ENVIRONMENT

It has been observed that in Higher Education there is no proper utilization of modern techniques and utilization of ICT. There are several types of modern technology used in class room to delivered lectures so, that stu...

A Prototypical Solution for Cyber Space

Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive netwo...

Stemmers for Tamil Language: Performance Analysis

Stemming is the process of extracting root word from the given inflection word and also plays significant role in numerous application of Natural Language Processing (NLP). Tamil Language raises several challenges to NLP...

“Automatic Question Generation from Punjabi Text :A Review” 

Question generation is an application of the NLP (Natural Language Processing). In automatic question generation the system generate multiple choice questions automatically from Punjabi text using question generation tec...

FLEXURAL RESPONSE OF FRC BEAMS WITH EXTERNAL GFRP LAMINATES

This study presents the experimental results of steel fibre reinforced concrete beams with externally bonded glass fibre reinforced polymer laminates with a view to study their strength and ductility. Three types of beam...

Download PDF file
  • EP ID EP164814
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Sonali Karale, Sachin Choudhari (2016). Secure Data Sharing using Decoy Technology. International Journal of Computer Science & Engineering Technology, 7(9), 410-414. https://europub.co.uk/articles/-A-164814