SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Iniciar sesión
Registrarse
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
Denunciar
IRJET Journal
Seguir
Fast Track Publications
6 de Nov de 2017
•
0 recomendaciones
•
21 vistas
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
6 de Nov de 2017
•
0 recomendaciones
•
21 vistas
IRJET Journal
Seguir
Fast Track Publications
Denunciar
Ingeniería
https://irjet.net/archives/V4/i1/IRJET-V4I1199.pdf
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
1 de 4
Descargar ahora
1
de
4
Recomendados
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
316 vistas
•
4 diapositivas
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
44 vistas
•
4 diapositivas
REU Group 2 - Paper
Scott Payne
171 vistas
•
41 diapositivas
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
542 vistas
•
6 diapositivas
50120140507006
IAEME Publication
331 vistas
•
5 diapositivas
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
411 vistas
•
4 diapositivas
Más contenido relacionado
La actualidad más candente
82 86
Editor IJARCET
1K vistas
•
5 diapositivas
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
54 vistas
•
3 diapositivas
The Data Distribution Service Tutorial
Angelo Corsaro
4.1K vistas
•
114 diapositivas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
151 vistas
•
6 diapositivas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
297 vistas
•
6 diapositivas
Certificate less key management scheme in
IJNSA Journal
218 vistas
•
5 diapositivas
La actualidad más candente
(20)
82 86
Editor IJARCET
•
1K vistas
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
•
54 vistas
The Data Distribution Service Tutorial
Angelo Corsaro
•
4.1K vistas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
•
151 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
297 vistas
Certificate less key management scheme in
IJNSA Journal
•
218 vistas
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
•
43 vistas
Privacy Preserving Location Query Service
IRJET Journal
•
24 vistas
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
•
504 vistas
F018133640.key aggregate paper
IOSR Journals
•
74 vistas
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
•
11 vistas
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
•
31 vistas
DDS In Action Part II
Angelo Corsaro
•
1.5K vistas
Vortex Tutorial Part 2
ADLINK Technology IoT
•
590 vistas
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
•
24 vistas
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
•
477 vistas
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
•
134 vistas
Proactive Secret Sharing using a Trivariate Polynomial
IJERA Editor
•
48 vistas
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET Journal
•
18 vistas
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Angelo Corsaro
•
1.3K vistas
Similar a Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
11 vistas
•
4 diapositivas
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
4 vistas
•
3 diapositivas
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
11 vistas
•
3 diapositivas
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET Journal
26 vistas
•
3 diapositivas
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
12 vistas
•
5 diapositivas
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal
15 vistas
•
3 diapositivas
Similar a Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
(20)
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
•
11 vistas
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
•
4 vistas
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
•
11 vistas
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET Journal
•
26 vistas
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
•
12 vistas
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal
•
15 vistas
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
•
20 vistas
A cloud security approach for data at rest
ijccsa
•
478 vistas
A Cloud Security Approach for Data at Rest Using FPE
neirew J
•
134 vistas
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
•
39 vistas
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
•
4 vistas
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
•
2 vistas
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
•
2 vistas
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
IOSR Journals
•
429 vistas
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
•
618 vistas
Ijarcet vol-2-issue-7-2232-2235
Editor IJARCET
•
429 vistas
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET Journal
•
19 vistas
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET Journal
•
15 vistas
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET Journal
•
26 vistas
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
•
14 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
6 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
3 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
3 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
2 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
3 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
3 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
6 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
3 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
3 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
2 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
3 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
3 vistas
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
2 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
2 vistas
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
2 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
2 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
5 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
6 vistas
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
2 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
2 vistas
Understanding the Nature of Consciousness with AI
IRJET Journal
•
2 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
4 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
2 vistas
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
2 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
2 vistas
Último
THEODOLITE.ppsx
MOHDTARIQFAROOQUI
68 vistas
•
17 diapositivas
Ansys Technology Day in Budapest, Agenda
SIMTEC Software and Services
185 vistas
•
2 diapositivas
Building a Digital Thread
TaylorDuffy11
59 vistas
•
54 diapositivas
1st Ansys Technology Day in Athens,Agenda
SIMTEC Software and Services
113 vistas
•
2 diapositivas
UNIT-V FIRE SAFETY INSTALLATION
karthi keyan
53 vistas
•
51 diapositivas
UNIT 1 MACHINERIES
karthi keyan
27 vistas
•
44 diapositivas
Último
(20)
THEODOLITE.ppsx
MOHDTARIQFAROOQUI
•
68 vistas
Ansys Technology Day in Budapest, Agenda
SIMTEC Software and Services
•
185 vistas
Building a Digital Thread
TaylorDuffy11
•
59 vistas
1st Ansys Technology Day in Athens,Agenda
SIMTEC Software and Services
•
113 vistas
UNIT-V FIRE SAFETY INSTALLATION
karthi keyan
•
53 vistas
UNIT 1 MACHINERIES
karthi keyan
•
27 vistas
gaurav singh 19ME25 (1).pptx
GauravSingh31583
•
15 vistas
OpenOCD-K3
Nishanth Menon
•
44 vistas
Dynamics (Hibbeler) (1).pdf
VEGACHRISTINEF
•
45 vistas
Data Communication & Computer Networks
Sreedhar Chowdam
•
65 vistas
UNIT III PRINCIPLES OF ILLUMINATION
karthi keyan
•
25 vistas
JSA-Piling or Concreting for Foundations & Building
Alvin160771
•
20 vistas
ComputerIntroduction.ppt
IlaiyarajaS2
•
18 vistas
Bricks.pptx
SubhamSharma20947
•
15 vistas
Security-by-Design and -Default
Mehdi Mirakhorli
•
69 vistas
Google Cloud Study Jam | GDSC NCU
Shivam254129
•
18 vistas
VFD DRIVES TROUBLESHOOTING.pptx
CONTROLS SYSTEMS
•
17 vistas
North American YAT-28 Turbo Trojan.pdf
TahirSadikovi
•
16 vistas
Reinforced earth structures notes.pdf
RamyaNarasimhan5
•
93 vistas
Introduction to Data Science.pptx
Anusuya123
•
24 vistas
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Cryptology
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1125 SHARING SECURED SCALABLE DATA IN CLOUD ENVIRONMENT USING KEY AGGREGATE CRYPTOLOGY K. VENKAT REDDY, K. RAJENDRA PRASAD, A. SOUJANYA, C. SRIKANTH Student, M.Tech CSE Dept.,Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India. Professor & HOD, CSE Department Institute of Aeronautical Engineering Hyderabad -500043, Telangana, India Assistant Professor CSE Dept.,Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India. Assistant Professor CSE Dept.,Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India. ---------------------------------------------------------------------***------------------------------------------------------------------- Abstract - Data sharing is a vital convenience in disseminated stockpiling. The vital utilization of circulated registering is data stockpiling and point of confinement of limit for cloud clients. Cryptographyisinstrumentfor dataand PC security i.e. by encryption of data. This paper proposes about the particular security techniques, cryptographic figuring to address the data security and assurance issue in circulated stockpiling in order to guarantee the data setaway in the cloud framework. The limit of particularly offering encoded data to different customers by method for open circulated stockpiling may hugely ease security stresses over accidental data spills in the cloud. A key test to arrangingsuch encryption arranges lies in the capable organization of encryption keys. In various words, the puzzle key holder can release a steady size aggregate key for versatile choices of cipher text set in dispersed stockpiling, yet the other encoded records outside the set stay private. This traditionalist aggregate key can be accommodatingly sent to others or be secured in a savvy card with to a great degree confined secure stockpiling. Notwithstanding, this in like manner induces the need of securely dispersing to customers a significant number of keys for both encryption and look, and those customers should securely store they got scratches, and exhibit an also boundless number of catchphrase trapdoors to the cloud remembering the ultimate objective to perform look for over the shared data. Keywords: Cloud storage, Aggregate key, Data sharing, key-aggregateencryption, decryption,Cryptographyand cipher text. 1. INTRODUCTION Distributed computing is moving as something else and a wide part of the affiliations aremoving tothecloudhowever, requiring as an aftereffect of security reasons. The change of the Cloud structure has adjusted the orchestrating of wide scale coursed frameworks for gathering shippers.TheCloud structure gives a sensible and bound together interface amongst shipper and client, allowing merchants to focus extra on the gathering itself rather than the vital system. Applications on the Cloud speak to pack as a Service framework and Multi-occupant databases. The Cloud structure adequately allocates system assets in light of clients' leeway reservation asks for and as indicated by clients' predesigned nature of the association. Information sharing is a fundamental quality in dispersed stockpiling. For instance,bloggerscanpermittheiramigosto see a subset of their private pictures; a try may give her representatives access to a touch of delicate information. The testing issue is the path by which to attainably share encoded information. Unmistakably clients can download the encoded information from thefarthestpoint,disentangle them, then send them to others for sharing, yet it loses the estimation of spread stockpiling. Clients ought to be able to assign the path advantages of the granting information to others to the target that they cangettothis informationfrom the server especially. In any case, finding a productive and secure approach to manage offer halfway information in scattered stockpiling is not insignificant. Cryptography, in current days, is considered a combination of three types of algorithms. They are (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. The Integrity of data is ensured by hashing algorithms. The four arrangement models worked by distributed computing square measure the: Public Cloud, Private Cloud, Community Cloud, and Hybrid Cloud as appeared in Fig 1[1].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1126 Chart 1.Models in Cloud Computing. "To diagram a capable open key encryption arrangement which supports versatile task as in any subset of the ciphertexts (made by the encryption arrangement) is decryptable by a consistentsizeunravelingkey(delivered by the proprietor of the master riddle key)." We appreciate this issue by demonstrating a remarkable kind of open key encryption which we call key-total cryptosystem (KAC). In KAC, clientsencodea messageunder an open key, and furthermore under an identifier of ciphertext called class. That surmises the figure writingsare further coordinated into various classes. The key proprietor holds a specialist puzzle called master riddle key, which can be utilized to center mystery keys for various classes. All the more essentially, the isolated key have can be all out key which is as more diminutive as a secret key for a singular class, however, signifies the force of different such keys, i.e., the unscrambling power for any subset of ciphertextclasses. Chart2: Bob and Alice Encryption and Decryption With our solution, Alice can just send Bob a single aggregate key by means of a protected email. Bob can download the encrypted photographs from Alice's Dropbox space and afterward utilize this aggregate key to decrypt these encrypted photographs. The situation is depicted in Figure 2. All developments can be demonstrated secure in the standard model. To the best of our insight, our aggregation mechanism in KAC has not been explored. 2. PRELIMINARIES In this section, we review some fundamental suppositions and cryptology thoughts which will be required later in this paper. In whatever is left of our talks, let G and G1 two cyclic social occasions of prime solicitation p, and g be a generator of G. Likewise, let doc be the record to be mixed, k the searchable encryption key, and T r the trapdoor for catchphrase look for. 2.2 2.1 Broadcast Encryption In a broadcast encryption (BE) plan, a conveyer encodesa message for some subset S of customerswhoarelisteningon an impart channel. Any customer inScanusehis/herprivate key to disentangle the convey. A BE arrangement can be depicted as a tuple of three polynomial-time figuring BE = (Setup, Encrypt, De-grave) as takes after: Setup (1, n): this computation is controlled by the structure to set up the arrangement.Ittakesasinformationa security parameter 1 and the amount ofrecipientsn,yieldsn private keys d1; dn and an open key pk. Encrypt (pk; S): this figuring is controlled by the broadcaster to scramblea messagefora subset ofcustomers. It takes as data an open key pk and a subset of customers S f1; ; ng, yields a couple (Hdr,K), where Hdr is known as the header and K is a message encryptionkeywhichisembodied in Hdr. We will every now and again imply Hdr as the impart ciphertext. For a strong message, it will be mixed by K and imparted to the customers in S. Decrypt (pk; S; i; di; Hdr): this figuring is controlled bythe customer to unscramble the got messages.Ittakesasdata an open key pk, a subset of customers S f1; ; ng, a customer id i 2 f1; ; ng, the private key di for customer i and a header Hdr, yields the message encryption key K or the failure picture ?. The K will be used to decipher the got messages. To ensure the system to be correct, it is required that, for all S f1; ; ng and all i 2 S, if (pk, (d1; ; dn) R Setup(1 , n) and (Hdr, K) R Encrypt(pk; S)), by then Decrypt(pk; S; i; di; Hdr)=K. 2.2 Sharing Encrypted Data An approved utilization of KAC is information sharing. The key accumulating property is particularly valuable when we expect that the assignment will be beneficial and adaptable. The courses of action empower a substance supplier to share her information in a described and specific route, with a balanced and little ciphertext expansion, by streaming to every certified client a solitary and insignificant total key.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1127 Here we depict the fundamentally considered information partaking in scatteredstockpilingutilizing KAC,addressedin Figure 2. Acknowledge Alice needs to share her information m1; m2; m on the server. She first performs Setup (1 ; n) to get param and execute KeyGen to get general society/expert question key pair (pk; msk). The structure parameterparam and open key pk can be made open andacequestionkeymsk ought to be kept mystery by Alice. Anybody (numbering Alice herself) can then encode every mi by Ci = Encrypt (pk; i; mi). The blended information are traded to the server. With param and pk, individuals who coordinate with Alice can overhaul Alice's information on the server. Right when Alice will share a set S of her information with a pal Bob, she can figure the total key KS for Bob by performing Extract (msk; S). Since KS is only an anticipated size key, it is unquestionably not hard to be sent to Bob by a techniquefor a guaranteed email. Subsequent to getting the total key, Bob can download the information he is certified to get to. That is, for every i 2 S, Bob downloads Ci (and some required qualities in param) from the server. With the total key KS, Bob can unscramble every Ci by Decrypt (KS; S; i; Ci) for every i 2 S. 2.3 Key aggregate encryption for data sharing In standard technique, to confer social occasion of files to different encryption keys with the same customer, data proprietor requires to fitting all the keys to the customer. To address this issue, key aggregatecryptosystem to diminish the amount of spread data encryption keys in fig 3. Chart 3: Key aggregate encryption for data sharing 3. ENCRYPTION ALGORITHM Algorithm: Encryption of given data Procedure A: select the characters n(c); B: converting the selected characters into ASCII values; C: Forming the selected characters into m x m matrices; I.e. m x m > n(c); D: dividing the m x m matrices into top, diagonal, lower matrices; E: Read the values of each matrix and named as key K = k1, k2, k3; F: Apply encryption method into matrix same order values i.e. to, diagonal, lower matrices; G: Read column by column from the matrix and generates a key k4 (k4 is encrypted value); End procedure Graph: Encryption of given data i.e. no of bits are encrypted in a time constant 4.CONCLUSION Considering the present issue of security guaranteeing information sharingframework inlightofopenappropriated stockpiling which requires an information proprietor to circle a broad number of keys to customers to empower them to get to his/her records, we peculiarly propose key- complete encryption. Both examination and evaluation happen bear witness to that our work can give a persuading reaction for building functional information sharing framework in the context of open appropriated stockpiling. cloud enrolling environment depends on upon a couple security happens asexpected towork concordantlytogether. In any case, in our studies we didn't see any security happens supplier owning the workplaces essential to get a lot of security resemblance for hazes. While cost and convenience are two brilliant inclinations of coursed enlisting, there are immense security focuses on that should
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1128 be tended to when considering moving key applications and delicate information to open and shared cloud. ACKNOWLEDGEMENT We thank our HOD “Prof. K. RAJENDRA PRASAD” for giving us the eminent facilities to perform my Project work. I am obliged to of CSE department, IARE for their timely help and support. REFERENCES [1]. K.VijayKumar,PreservingData Privacy,Securitymodels and Cryptographic Algorithms in Cloud Computing, International Journal of Computer Engineering & Applications, India. [2]. G. Suganyadevi , Effective Data Sharing inCloud Aggregate Key and Digital Signature, International Journal Of Innovative Research In Science, Engineering And Technology,Vol4,Special Issue 6,May 2015. [3]. N.Vaitheeka,Preserving privacy by enhancing security in cloud, International Journal OfInnovativeResearchIn Science, EngineeringAndTechnology,Vol3,,March2015. [4]. Shashank Dara, Cryptographic challenges for computational privacy in public clouds, IIT Bangalore. [5]. T.Parameswaran,AnEfficient Sharingofpersonal Health records Using DABE in Secure Cloud Environment,International Journal of Advanced Research in Coumputer Engineering & Technology, Vol 2, Issue 3,March 2013. [6]. Cheng-Kang CHU, Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,Research Collection School of information systems, Singapore Management university. [7]. Baojiang Cui,Zheli Liu,Key-Aggregate Searchable Encryption(KASE) for Group Data Sharing Via Cloud Storage,IEEETransactionsonComputers,Vol 6,Jan2014. [8]. K.manohar,R.AnilKumar, Key-Aggregate Searchable Encryption for Group Data Sharing Via Cloud Storage,International Journal of Computer Engineering in Research Trends,Vol 2,Issue 12,Dec 2015,PP.1132- 1136. [9]. Vanya Diwan, Shubhra Malhotra,Rachna Jain, Cloud Security Solutions: comparison among various Cryptographic Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering, New Delhi, India. [10]. Ajay Gawade, ASurvey ofDifferent Searching Techniques for Encrypted Data sharing on Cloud, Vol6, Issue 7,July 2016, International Journal of Advanced ResearchinComputerScienceandSoftwareEngineering