A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

Editor IJCATR
Editor IJCATREditor in Chief at International Journal of Computer Applications Technology and Research en International Journal of Computer Applications Technology and Research

The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible hierarchy, which was yet to be known.

International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 69
A Review on Key-Aggregate Cryptosystem for
Climbable Knowledge Sharing in Cloud Storage
Priyanka Kale
Department of Computer Science And Engineering
BIT, Ballarpur, India
Mrunali Vaidya
Department of Computer Science And Engineering
BIT, Ballarpur, India
Abstract: The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Keywords: Cloud storage, data sharing, key-aggregate cryptosystem, Identity encryption, Attribute encryption, cryptosystem.
1.INTRODUCTION
Cloud computing is widely increasing technology; data can be
saved on cloud remotely and can have access to huge
applications with quality services which are shared among
customers. As increase in outsourcing of data the cloud
computing serves does the management of data [1].Its flexible
and cost optimizing characteristic motivates the end user as
well as enterprises to store the data on cloud. The insider
attack is one of security concern which’s needs to be focused.
Cloud Service provider need to make sure whether audits are
held for users who have physical access to the server. As
cloud service provider stores the data of different users on
same server it is possible that user’s private data is leaked to
others. The public auditing system of data storage security in
cloud computing provides a privacy-preserving auditing
protocol [2].
It is necessary to make sure that the data integrity without
compromising the anonymity of the data user. To ensure the
integrity the user can verify metadata on their data, upload
and verify metadata [3].The main concern is how to share the
data securely the answer is cryptography. The question is
how can the encrypted data is to be shared. The user must
provide the access rights to the other user as the data is
encrypted and the decryption key should be send securely. For
an example Alice keeps her private data i.e. photos on
dropbox and she doesn’t want to share it with everyone. As
the attacker may access the data so it is not possible to rely on
predefine privacy preserving mechanism so she all the
photos were encrypted by her on encryption key while
uploading it.
2.LITERATURE SURVEY
Cloud computing is visualized as architecture for succeeding
generation. It has many facilities though have a risk of
attacker who can access the data or leak the users identity.
While setting a cloud users and service providers
authentication is necessary. The issue arises whether loud
service provider or user is not compromised. The data will
leak if any one of them in compromised. The cloud should be
simple, preserving the privacy and also maintaining users
identity [1]
The flexible use of cloud storage for user is a need as it is
seams accessing data locally though that is present at remote
side. It is important to inspect the data set on the cloud. So it
is necessary to allow a public audit for integrity of outsourced
data through third party auditor (TPA). TPA is also beneficial
for cloud service provider. It checks the correctness of the
outsourced data. TPA should be able to do public audit ability,
storage correctness, privacy preserving, Batch auditing with
minimum communication and computation overhead[2].
There are many cloud users who wants to upload there data
without providing much personal details to other users. The
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 70
anonymity of the user is to be preserved so that not to reveal
the identity of data owner. Provable data possession (PDP)
uses similar demonst rating marks to reduce computation on
server, and network traffic. PDA ensures the data present on
cloud which is un-trusted is original without accessing it.
Security mediator (SEM) is approach allows the user to
preserve the anonymity. Users are meant to upload all their
data to SEM so that the SEM is not able to understand the
data although it’s going to generate the verification on data.
As the users are signed at SEM it should not know the identity
of up loader [3].
3.WORKING
Fig .Data flow Diagram
Above figure shows how data flows between user and
receiver. Firstly user registration for login with valid
username and password then ID key generation and identity
key authentication when the verify both key then secrete key
authentication verification it goes to Attribute based
encryption specification/verification of user this user valid for
login or not. If user valid for login then documents handling
of user, and user not valid then found error for document
handling.
4 TYPEOF ENCRYPTION TECHNIQUES
4.1 Key-Aggregate Cryptosystem
New public-key cryptosystems which produce constant-size
cipher texts such that efficient delegation of decryption rights
for any set of cipher texts are possible. The novelty is that one
can aggregate any set of secret keys and make them as
compact as a single key, but encompassing the power of all
the keys being aggregated. In other words, the secret key
holder can release a constant-size aggregate key for flexible
choices of cipher text set in cloud storage, but the other
encrypted files outside the set remain confidential.
A key-aggregate encryption system basically includes five
algorithmic steps as follows- The data owner establishes the
public system parameter by using Setup and generates a
public/master-secret key pair by using KeyGen. Messages
can be encrypted using Encrypt by anyone who also decides
what ciphertext class is associated with the plaintext message
to be encrypted. The data owner can use the master-secret to
generate an aggregate decryption key for a set of ciphertext
classes by Extract. The generated keys can be passed to
Receivers securely via secure e-mails. Finally, any user with
an aggregate key can decrypt any ciphertext provided that the
ciphertext’s class is contained in the aggregate key via
Decrypt.
a) Setup Phase
The data owner executes the setup phase for an account
onserver which is not trusted. The setup algorithm only Take
simplicit security parameter.
b)KeyGen Phase
This phase is executed by data owner to generate the public or
the master key pair (pk, msk).
c) Encrypt Phase
This phase is executed by anyone who wants to send the
encrypted data. Encrypt (pk, m, i), the encryption algorithm
takes input as public parameters pk, a message m, and I
denoting cipher text class. The algorithm encrypts message m
and produces a cipher text C such that only a user that has a
set of attributes that satisfies the access structure is able to
decrypt the message.
d) Cloud Storage
Cloud storage is nowadays very popular storage
system. Cloud storage is storing of data off- site to
the physical storage which is maintained by third
party. Cloud storage is saving of digital data in
logical pool and physical storage spans multiple
servers which are manage by third party. Third
party is responsible for keeping data available and
accessible and physical environment should be
protected and running at all time. Instead of storing
data to the hard drive or any other local storage, we
save data to remote storage which is accessible from
anywhere and anytime. It reduces efforts of carrying
physical storage to everywhere. By using cloud
storage we can access information from any
computer through internet which omitted limitation
of accessing information from same computer
where it is stored. While considering data privacy,
we cannot rely on traditional technique of
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 71
authentication, because unexpected privilege
escalation will expose all data. Solution is to
encrypt data before uploading to the server with
user’s own key. Data sharing is again important
functionality of cloud storage, because user can
share data from anywhere and anytime to anyone.
For example, organization may grant permission to
access part of sensitive data to their employees. But
challenging task is that how to share encrypted data.
Traditional way is user can download the encrypted
data from storage, decrypt that data and send it to
share with others, but it loses the importance of
cloud storage.
4.2 Identity encryption techniques
 System will automatically generate identity string
of every user using set of different system generated
algorithms
 Identity based encryption is a type of public key
encryption in which public-key of a user can be set
as an identity-string of the user
 At the time of registration every user will get his/her
identity key on email
 While uploading and downloading documents on
cloud, every user have to prove his/her identity
using identity key.
4.3Attribute based encryption
technique
 In this application we propose attribute based
encryption technique for documents encryption
 When user wants to upload any document for
particular set of users, he/she have to specify
permissions in attribute format
 ABE enhances the security of system and prevent
documents from leakage when attacker knows
secrete key
 In order to prevent key escrow and cipher text
enlargement problem we propose xml documents to
store users attributes
 System will automatically create one xml doc for
every user to specify his documents access
attributes
 The xml document will be stored in encrypted
format on server.
5. CONCLUSIONS
To share data flexibly is vital thing in cloud computing. Users
prefer to upload there data on cloud and among different
users. Outsourcing of data to server may lead to leak the
private data of user to everyone. Encryption is a on solution
which provides to share selected data with desired candidate.
Sharing of decryption keys in secure way plays important
role. Public-key cryptosystems provides delegation of secret
keys for different cipher text classes in cloud storage. The
delegate gets securely an aggregate key of constant size It is
required to keep enough number of cipher texts classes as they
increase fast and the cipher text classes are bounded that is the
limitation.
6.ACKNOWLEDGMENTS
I would like to extend my gratitude to many people who
helped me to bring this paper fruition. First I would like to
thank Prof. Mrunali Vaidya. I am so deeply grateful for her
help, professionalism, and valuable guidance throughout this
paper. I would also like to thank to my friends and colleague.
This accomplishment would not have been possible without
them. Thank you.
7.REFERENCES
[1].S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu,
“SPICE -Simple Privacy-Preserving Identity-Management for
Cloud Environment,”in Applied Cryptography and Network
Security –ACNS 2012, ser.LNCS, vol. 7341. Springer, 2012,
pp. 526–543.
[2].C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou,
“Privacy-Preserving Public Auditing for Secure Cloud
Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362–375,
2013.
[3].B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing
Shared Dataon the Cloud via Security-Mediator,” in
International Conference on Distributed Computing Systems -
ICDCS 2013. IEEE, 2013.
[4].Cheng Kang Chu, Sherman S.M. Chow, Wen-Guey
Tzeng, Jianying Zhou, and Robert H. Deng,,” Key Aggregate
Cryptosystem for
Scalable Data Sharing in Cloud Storage “,IEEE Transaction
on Parellel and Distributed System, vol. 25, no. 2, February
2014 .
[5]S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters,
“Practical Leakage-Resilient Identity-Based Encryption from
Simple Assumptions,” Proc. ACM Conf. Computer and
Comm. Security, pp. 152-161, 2010.
[6].S. Singh,”Different Cloud Computing Standards a Huge
Challenge”, The Economic times, 4 June 2009.
[7] .J. Urquhart, “The Biggest Cloud computingIssue of
2009is Trust”, C-NetNews, 7 Jan 2009
[8].D. Boneh and M. K. Franklin, “Identity
-Based Encryption from the Weil Pairing,” in Proceedings of
Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol.
2139. Springer, 2001, pp. 213–229.
[9]M. Chase and S. S. M. Chow,“Improving Privacy and
Security in Multi-Authority Attribute-Based Encryption,” in
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 72
CM Conference on Computer and Communications Security,
2009, pp. 121 –130.

Recomendados

J018145862 por
J018145862J018145862
J018145862IOSR Journals
145 vistas5 diapositivas
V5 i7 0169 por
V5 i7 0169V5 i7 0169
V5 i7 0169Siddhartha Bashetty
117 vistas5 diapositivas
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami... por
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
81 vistas5 diapositivas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
279 vistas7 diapositivas
Paper id 27201446 por
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
399 vistas4 diapositivas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
606 vistas3 diapositivas

Más contenido relacionado

La actualidad más candente

Attribute-Based Data Sharing por
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
352 vistas4 diapositivas
Cloud Auditing With Zero Knowledge Privacy por
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
172 vistas6 diapositivas
IJSRED-V2I3P52 por
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
14 vistas4 diapositivas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
339 vistas6 diapositivas
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S... por
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
84 vistas13 diapositivas
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud por
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
18 vistas4 diapositivas

La actualidad más candente(20)

Attribute-Based Data Sharing por IJERA Editor
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor352 vistas
Cloud Auditing With Zero Knowledge Privacy por IJERA Editor
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor172 vistas
IJSRED-V2I3P52 por IJSRED
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED14 vistas
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce... por revathirram
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram339 vistas
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S... por 1crore projects
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects84 vistas
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud por IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal18 vistas
4.authentication and key agreement based on anonymous identity for peer to-pe... por Venkat Projects
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects267 vistas
Secure data sharing for dynamic groups in multi-owner using cloud por Sagar Dhanake
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake1.3K vistas
Secure Data Sharing in Cloud (SDSC) por Jishnu Pradeep
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep3.1K vistas
Secret keys and the packets transportation for privacy data forwarding method... por eSAT Publishing House
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method... por eSAT Journals
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals73 vistas
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups por IRJET Journal
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal32 vistas
Secure data sharing in cloud computing using revocable storage identity-based... por Shakas Technologies
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies176 vistas
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base... por rahulmonikasharma
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma256 vistas
IRJET - Providing High Securtiy for Encrypted Data in Cloud por IRJET Journal
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal18 vistas
Decentralized access control with anonymous authentication of data stored in ... por Adz91 Digital Ads Pvt Ltd
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server por IRJET Journal
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal27 vistas
Secure Redundant Data Avoidance over Multi-Cloud Architecture. por IJCERT JOURNAL
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL224 vistas
Decentralized access control with anonymous authentication of data stored in ... por LeMeniz Infotech
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech617 vistas
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por IJCERT JOURNAL
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL423 vistas

Destacado

Key aggregate cryptosystem for scalable data sharing in cloud storage por
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShakas Technologies
2.1K vistas6 diapositivas
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem... por
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
509 vistas11 diapositivas
key-aggregate cryptosystem for scalable data sharing in cloud storage por
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
824 vistas4 diapositivas
Key aggregate cryptosystem for scalable data sharing in cloud storage por
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
11.7K vistas8 diapositivas
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING por
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
268 vistas10 diapositivas
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... por
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
5.2K vistas14 diapositivas

Destacado(8)

Key aggregate cryptosystem for scalable data sharing in cloud storage por Shakas Technologies
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shakas Technologies2.1K vistas
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem... por hemanthbbc
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc509 vistas
key-aggregate cryptosystem for scalable data sharing in cloud storage por swathi78
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
swathi78824 vistas
Key aggregate cryptosystem for scalable data sharing in cloud storage por Adz91 Digital Ads Pvt Ltd
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING por Editor IJMTER
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER268 vistas
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... por Nexgen Technology
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Nexgen Technology 5.2K vistas
Key aggregate cryptosystem for scalable data sharing in cloud por Meka Subramanyam
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam2.4K vistas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por CloudTechnologies
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies2.4K vistas

Similar a A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

Improving Efficiency of Security in Multi-Cloud por
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
317 vistas4 diapositivas
Paper2 por
Paper2Paper2
Paper2Vikas Khairnar
129 vistas4 diapositivas
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
294 vistas6 diapositivas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
21 vistas3 diapositivas
Two Aspect Validation Control Frameworks for Online Distributed Services por
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
35 vistas3 diapositivas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
64 vistas4 diapositivas

Similar a A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage(20)

Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 vistas
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 vistas
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and... por IRJET Journal
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal21 vistas
Two Aspect Validation Control Frameworks for Online Distributed Services por IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal35 vistas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal64 vistas
Achieving Secure, sclable and finegrained Cloud computing report por Kiran Girase
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase489 vistas
Iaetsd a survey on cloud storage security with por Iaetsd Iaetsd
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd346 vistas
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt... por Eswar Publications
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Eswar Publications104 vistas
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T... por IJNSA Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal397 vistas
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T... por IJNSA Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal4 vistas
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity... por IRJET Journal
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal5 vistas
A cloud storage system for sharing data securely with privacy preservation an... por eSAT Journals
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals131 vistas
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal11 vistas
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members por IRJET Journal
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal39 vistas
Enhanced security framework to ensure data security in cloud using security b... por eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals137 vistas
Attribute-Based Encryption for Access of Secured Data in Cloud Storage por IJSRD
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD 327 vistas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal59 vistas

Más de Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model por
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
24 vistas9 diapositivas
Green Computing, eco trends, climate change, e-waste and eco-friendly por
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
6 vistas8 diapositivas
Policies for Green Computing and E-Waste in Nigeria por
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
11 vistas4 diapositivas
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce... por
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
7 vistas10 diapositivas
Optimum Location of DG Units Considering Operation Conditions por
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
3 vistas6 diapositivas
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi... por
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
11 vistas7 diapositivas

Más de Editor IJCATR(20)

Text Mining in Digital Libraries using OKAPI BM25 Model por Editor IJCATR
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR24 vistas
Green Computing, eco trends, climate change, e-waste and eco-friendly por Editor IJCATR
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR6 vistas
Policies for Green Computing and E-Waste in Nigeria por Editor IJCATR
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR11 vistas
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce... por Editor IJCATR
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR7 vistas
Optimum Location of DG Units Considering Operation Conditions por Editor IJCATR
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR3 vistas
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi... por Editor IJCATR
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR11 vistas
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... por Editor IJCATR
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR7 vistas
Semantic Similarity Measures between Terms in the Biomedical Domain within f... por Editor IJCATR
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR7 vistas
A Strategy for Improving the Performance of Small Files in Openstack Swift por Editor IJCATR
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR5 vistas
Integrated System for Vehicle Clearance and Registration por Editor IJCATR
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR22 vistas
Assessment of the Efficiency of Customer Order Management System: A Case Stu... por Editor IJCATR
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR8 vistas
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A* por Editor IJCATR
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR4 vistas
Security in Software Defined Networks (SDN): Challenges and Research Opportun... por Editor IJCATR
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR20 vistas
Measure the Similarity of Complaint Document Using Cosine Similarity Based on... por Editor IJCATR
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Editor IJCATR7 vistas
Hangul Recognition Using Support Vector Machine por Editor IJCATR
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR202 vistas
Application of 3D Printing in Education por Editor IJCATR
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
Editor IJCATR307 vistas
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ... por Editor IJCATR
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR134 vistas
Comparative analysis on Void Node Removal Routing algorithms for Underwater W... por Editor IJCATR
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Editor IJCATR138 vistas
Decay Property for Solutions to Plate Type Equations with Variable Coefficients por Editor IJCATR
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Editor IJCATR142 vistas
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica... por Editor IJCATR
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Editor IJCATR246 vistas

Último

The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
66 vistas25 diapositivas
Transcript: The Details of Description Techniques tips and tangents on altern... por
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
119 vistas15 diapositivas
Photowave Presentation Slides - 11.8.23.pptx por
Photowave Presentation Slides - 11.8.23.pptxPhotowave Presentation Slides - 11.8.23.pptx
Photowave Presentation Slides - 11.8.23.pptxCXL Forum
126 vistas16 diapositivas
MemVerge: Gismo (Global IO-free Shared Memory Objects) por
MemVerge: Gismo (Global IO-free Shared Memory Objects)MemVerge: Gismo (Global IO-free Shared Memory Objects)
MemVerge: Gismo (Global IO-free Shared Memory Objects)CXL Forum
112 vistas16 diapositivas
CXL at OCP por
CXL at OCPCXL at OCP
CXL at OCPCXL Forum
208 vistas66 diapositivas
"Fast Start to Building on AWS", Igor Ivaniuk por
"Fast Start to Building on AWS", Igor Ivaniuk"Fast Start to Building on AWS", Igor Ivaniuk
"Fast Start to Building on AWS", Igor IvaniukFwdays
36 vistas76 diapositivas

Último(20)

Transcript: The Details of Description Techniques tips and tangents on altern... por BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada119 vistas
Photowave Presentation Slides - 11.8.23.pptx por CXL Forum
Photowave Presentation Slides - 11.8.23.pptxPhotowave Presentation Slides - 11.8.23.pptx
Photowave Presentation Slides - 11.8.23.pptx
CXL Forum126 vistas
MemVerge: Gismo (Global IO-free Shared Memory Objects) por CXL Forum
MemVerge: Gismo (Global IO-free Shared Memory Objects)MemVerge: Gismo (Global IO-free Shared Memory Objects)
MemVerge: Gismo (Global IO-free Shared Memory Objects)
CXL Forum112 vistas
CXL at OCP por CXL Forum
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum208 vistas
"Fast Start to Building on AWS", Igor Ivaniuk por Fwdays
"Fast Start to Building on AWS", Igor Ivaniuk"Fast Start to Building on AWS", Igor Ivaniuk
"Fast Start to Building on AWS", Igor Ivaniuk
Fwdays36 vistas
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV por Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk86 vistas
Microchip: CXL Use Cases and Enabling Ecosystem por CXL Forum
Microchip: CXL Use Cases and Enabling EcosystemMicrochip: CXL Use Cases and Enabling Ecosystem
Microchip: CXL Use Cases and Enabling Ecosystem
CXL Forum129 vistas
AI: mind, matter, meaning, metaphors, being, becoming, life values por Twain Liu 刘秋艳
AI: mind, matter, meaning, metaphors, being, becoming, life valuesAI: mind, matter, meaning, metaphors, being, becoming, life values
AI: mind, matter, meaning, metaphors, being, becoming, life values
GigaIO: The March of Composability Onward to Memory with CXL por CXL Forum
GigaIO: The March of Composability Onward to Memory with CXLGigaIO: The March of Composability Onward to Memory with CXL
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum126 vistas
.conf Go 2023 - Data analysis as a routine por Splunk
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk90 vistas
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM por CXL Forum
Samsung: CMM-H Tiered Memory Solution with Built-in DRAMSamsung: CMM-H Tiered Memory Solution with Built-in DRAM
Samsung: CMM-H Tiered Memory Solution with Built-in DRAM
CXL Forum105 vistas
The Importance of Cybersecurity for Digital Transformation por NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS25 vistas
"Thriving Culture in a Product Company — Practical Story", Volodymyr Tsukur por Fwdays
"Thriving Culture in a Product Company — Practical Story", Volodymyr Tsukur"Thriving Culture in a Product Company — Practical Story", Volodymyr Tsukur
"Thriving Culture in a Product Company — Practical Story", Volodymyr Tsukur
Fwdays40 vistas
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa... por The Digital Insurer
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... por NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS23 vistas
MemVerge: Memory Viewer Software por CXL Forum
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum118 vistas
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman25 vistas
[2023] Putting the R! in R&D.pdf por Eleanor McHugh
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh38 vistas

A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

  • 1. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 69 A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage Priyanka Kale Department of Computer Science And Engineering BIT, Ballarpur, India Mrunali Vaidya Department of Computer Science And Engineering BIT, Ballarpur, India Abstract: The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible hierarchy, which was yet to be known. Keywords: Cloud storage, data sharing, key-aggregate cryptosystem, Identity encryption, Attribute encryption, cryptosystem. 1.INTRODUCTION Cloud computing is widely increasing technology; data can be saved on cloud remotely and can have access to huge applications with quality services which are shared among customers. As increase in outsourcing of data the cloud computing serves does the management of data [1].Its flexible and cost optimizing characteristic motivates the end user as well as enterprises to store the data on cloud. The insider attack is one of security concern which’s needs to be focused. Cloud Service provider need to make sure whether audits are held for users who have physical access to the server. As cloud service provider stores the data of different users on same server it is possible that user’s private data is leaked to others. The public auditing system of data storage security in cloud computing provides a privacy-preserving auditing protocol [2]. It is necessary to make sure that the data integrity without compromising the anonymity of the data user. To ensure the integrity the user can verify metadata on their data, upload and verify metadata [3].The main concern is how to share the data securely the answer is cryptography. The question is how can the encrypted data is to be shared. The user must provide the access rights to the other user as the data is encrypted and the decryption key should be send securely. For an example Alice keeps her private data i.e. photos on dropbox and she doesn’t want to share it with everyone. As the attacker may access the data so it is not possible to rely on predefine privacy preserving mechanism so she all the photos were encrypted by her on encryption key while uploading it. 2.LITERATURE SURVEY Cloud computing is visualized as architecture for succeeding generation. It has many facilities though have a risk of attacker who can access the data or leak the users identity. While setting a cloud users and service providers authentication is necessary. The issue arises whether loud service provider or user is not compromised. The data will leak if any one of them in compromised. The cloud should be simple, preserving the privacy and also maintaining users identity [1] The flexible use of cloud storage for user is a need as it is seams accessing data locally though that is present at remote side. It is important to inspect the data set on the cloud. So it is necessary to allow a public audit for integrity of outsourced data through third party auditor (TPA). TPA is also beneficial for cloud service provider. It checks the correctness of the outsourced data. TPA should be able to do public audit ability, storage correctness, privacy preserving, Batch auditing with minimum communication and computation overhead[2]. There are many cloud users who wants to upload there data without providing much personal details to other users. The
  • 2. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 70 anonymity of the user is to be preserved so that not to reveal the identity of data owner. Provable data possession (PDP) uses similar demonst rating marks to reduce computation on server, and network traffic. PDA ensures the data present on cloud which is un-trusted is original without accessing it. Security mediator (SEM) is approach allows the user to preserve the anonymity. Users are meant to upload all their data to SEM so that the SEM is not able to understand the data although it’s going to generate the verification on data. As the users are signed at SEM it should not know the identity of up loader [3]. 3.WORKING Fig .Data flow Diagram Above figure shows how data flows between user and receiver. Firstly user registration for login with valid username and password then ID key generation and identity key authentication when the verify both key then secrete key authentication verification it goes to Attribute based encryption specification/verification of user this user valid for login or not. If user valid for login then documents handling of user, and user not valid then found error for document handling. 4 TYPEOF ENCRYPTION TECHNIQUES 4.1 Key-Aggregate Cryptosystem New public-key cryptosystems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. A key-aggregate encryption system basically includes five algorithmic steps as follows- The data owner establishes the public system parameter by using Setup and generates a public/master-secret key pair by using KeyGen. Messages can be encrypted using Encrypt by anyone who also decides what ciphertext class is associated with the plaintext message to be encrypted. The data owner can use the master-secret to generate an aggregate decryption key for a set of ciphertext classes by Extract. The generated keys can be passed to Receivers securely via secure e-mails. Finally, any user with an aggregate key can decrypt any ciphertext provided that the ciphertext’s class is contained in the aggregate key via Decrypt. a) Setup Phase The data owner executes the setup phase for an account onserver which is not trusted. The setup algorithm only Take simplicit security parameter. b)KeyGen Phase This phase is executed by data owner to generate the public or the master key pair (pk, msk). c) Encrypt Phase This phase is executed by anyone who wants to send the encrypted data. Encrypt (pk, m, i), the encryption algorithm takes input as public parameters pk, a message m, and I denoting cipher text class. The algorithm encrypts message m and produces a cipher text C such that only a user that has a set of attributes that satisfies the access structure is able to decrypt the message. d) Cloud Storage Cloud storage is nowadays very popular storage system. Cloud storage is storing of data off- site to the physical storage which is maintained by third party. Cloud storage is saving of digital data in logical pool and physical storage spans multiple servers which are manage by third party. Third party is responsible for keeping data available and accessible and physical environment should be protected and running at all time. Instead of storing data to the hard drive or any other local storage, we save data to remote storage which is accessible from anywhere and anytime. It reduces efforts of carrying physical storage to everywhere. By using cloud storage we can access information from any computer through internet which omitted limitation of accessing information from same computer where it is stored. While considering data privacy, we cannot rely on traditional technique of
  • 3. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 71 authentication, because unexpected privilege escalation will expose all data. Solution is to encrypt data before uploading to the server with user’s own key. Data sharing is again important functionality of cloud storage, because user can share data from anywhere and anytime to anyone. For example, organization may grant permission to access part of sensitive data to their employees. But challenging task is that how to share encrypted data. Traditional way is user can download the encrypted data from storage, decrypt that data and send it to share with others, but it loses the importance of cloud storage. 4.2 Identity encryption techniques  System will automatically generate identity string of every user using set of different system generated algorithms  Identity based encryption is a type of public key encryption in which public-key of a user can be set as an identity-string of the user  At the time of registration every user will get his/her identity key on email  While uploading and downloading documents on cloud, every user have to prove his/her identity using identity key. 4.3Attribute based encryption technique  In this application we propose attribute based encryption technique for documents encryption  When user wants to upload any document for particular set of users, he/she have to specify permissions in attribute format  ABE enhances the security of system and prevent documents from leakage when attacker knows secrete key  In order to prevent key escrow and cipher text enlargement problem we propose xml documents to store users attributes  System will automatically create one xml doc for every user to specify his documents access attributes  The xml document will be stored in encrypted format on server. 5. CONCLUSIONS To share data flexibly is vital thing in cloud computing. Users prefer to upload there data on cloud and among different users. Outsourcing of data to server may lead to leak the private data of user to everyone. Encryption is a on solution which provides to share selected data with desired candidate. Sharing of decryption keys in secure way plays important role. Public-key cryptosystems provides delegation of secret keys for different cipher text classes in cloud storage. The delegate gets securely an aggregate key of constant size It is required to keep enough number of cipher texts classes as they increase fast and the cipher text classes are bounded that is the limitation. 6.ACKNOWLEDGMENTS I would like to extend my gratitude to many people who helped me to bring this paper fruition. First I would like to thank Prof. Mrunali Vaidya. I am so deeply grateful for her help, professionalism, and valuable guidance throughout this paper. I would also like to thank to my friends and colleague. This accomplishment would not have been possible without them. Thank you. 7.REFERENCES [1].S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE -Simple Privacy-Preserving Identity-Management for Cloud Environment,”in Applied Cryptography and Network Security –ACNS 2012, ser.LNCS, vol. 7341. Springer, 2012, pp. 526–543. [2].C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362–375, 2013. [3].B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Dataon the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013. [4].Cheng Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng,,” Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage “,IEEE Transaction on Parellel and Distributed System, vol. 25, no. 2, February 2014 . [5]S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, “Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,” Proc. ACM Conf. Computer and Comm. Security, pp. 152-161, 2010. [6].S. Singh,”Different Cloud Computing Standards a Huge Challenge”, The Economic times, 4 June 2009. [7] .J. Urquhart, “The Biggest Cloud computingIssue of 2009is Trust”, C-NetNews, 7 Jan 2009 [8].D. Boneh and M. K. Franklin, “Identity -Based Encryption from the Weil Pairing,” in Proceedings of Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229. [9]M. Chase and S. S. M. Chow,“Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in
  • 4. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 72 CM Conference on Computer and Communications Security, 2009, pp. 121 –130.