Secure Data Sharing using Decoy Technology

Abstract

Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in cloud storage. Describe new public-key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. Show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. Cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. So provide formal security analysis of our schemes in the standard model and describe other application of our schemes. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. It Decoy technology provide security, Flexibility and confidentiality in data sharing.

Authors and Affiliations

Sonali Karale , Sachin Choudhari

Keywords

Related Articles

Hilditch’s Algorithm Based Tamil Character Recognition

Character identification plays a vital role in the contemporary world of Image processing. It can solve many composite problems and makes human’s work easier. An instance is Handwritten Character detection. Handwritten r...

Technical Review of Comparative Study on Different Algorithms of Image Inpainting 

Image inpainting is the technique of restoring the lost or damaged regions or modifying the image contents imperceptibly. Image inpainting can be used to fill in the missing area in an image which is visible to human eye...

Performance of I-LEACH Routing protocol for Wireless Sensor Networks

In wireless sensor networks, sensor node always have a limited power resource. The energy consumed by sensor nodes to transfer the data to its destination becomes critical issue in designing WSN routing protocols. In thi...

Performance of Appropriate Photovoltaic Model

Energy is very important key to improve human life. Due to the global warming and pollution, the new energy source is developed. Photovoltaic is one of these sources that growth in recent decades and has several models....

Survey on Clustering Techniques of Data Mining

The goal of this survey is to provide a comprehensive review of different clustering techniques in data mining. Data mining refers to extracting useful information from vast amounts of data. It is the process of discover...

Download PDF file
  • EP ID EP164814
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Sonali Karale, Sachin Choudhari (2016). Secure Data Sharing using Decoy Technology. International Journal of Computer Science & Engineering Technology, 7(9), 410-414. https://europub.co.uk/articles/-A-164814