Secure Data Sharing With Efficient Cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data We propose key-aggregate cryptosystem (KAC), a special type of public-key encryption. In KAC, users encrypt files not only under a public key and also with private key. In this we explain how to compress secret keys in public-key cryptosystem which supports delegation of secret keys for different cipher text classes in cloud storage.Our approach is more flexible than hierarchical key assignment which can only save spaces if all key-holders share a similar set of privileges.Here the aggregate key is of constant size. In addition, the proposed scheme is proven to be secure based on kmultilinear Decisional Diffie-Hellman assumption. On the other hand, we implement our scheme over the integers.
Authors and Affiliations
P. Danusha Chowdary, R. Pranutha, M. Sharmilla, Dr. S. Padma Priya
Increasing Production Rate of Gear Box Assembly Using SMED Concept
In This Paper The Purpose Of The Single Minute Exchange Die (SMED) Is To Eliminate Waste Of Time. Longer Setting Up Time Denotes That Production Line Is Not Very Productive. Nowadays, Everything Is Being Done Faster And...
Heat Transfer Enhancement of Shell and Tube Heat Exchanger
Heat exchanger is a device which provides a flow of thermal energy between two or more fluids at different temperatures. There are many problems created in the segmental heat exchanger during and after the work. The maj...
Through Virtualization implementation of IPTV service delivery using Optimizing Cloud Resources
Virtualized cloud-based services can get advantage of statistical multiplexing across applications to give significant cost savings to the manipulator. Carrying out of IPTV service delivery through Virtualization is of...
Integral Solutions of an Infinite Cone + = ( − ) + ( − )
The quadratic Diophantine equation representing an infinite cone given by ( + ) = ( − ) + ( − ), ∈ , is analyzed for its non-zero distinct integer points. Few different patterns of integer points satis...
Dynamic Analysis of TCSC on Distance Protection Relay & Its Mitigation
The basic operation principle of distance relay is based on the fact that the line impedance is fairly constant with respect to the line length. However, the implementation of FACTS controllers in power system transmiss...