IMPROVED AGGREGATED KEY CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE

SHIVANGI MISHRA, SAHANA T EDWIN

Abstract


Data sharing is a essential functionality in cloud storage .With the Internet technology and the usage of it in different smart devices, the sharing of data has become very easy.  Data sharing has become an important feature to be considered in cloud Computing. The users who use cloud want their files, folders, pictures and other confidential things to be available for their utilization in cloud storage. It is essential to safely, productively, and adaptable impart important information to others in distributed storage. A special type of public-key encryption which is called Improved Key-Aggregation Cryptosystem is designed to outline an effective scheme that helps in flexible delegation by a constant-size decryption key. The uniqueness of this approach is that one can aggregate any set of secret keys and make assemble as compact as a single key, but passing the decryption power of all the keys that is being aggregate. In cryptography, a fundamental problem is influence the secrecy of a small piece of knowledge into the capability to perform cryptographic functions multiple times. Here the efforts are taken for developing the powerful decryption key, which permits decryption of different cipher texts without expanding the size of aggregate. This scheme performs well in the standard model and can be applicable in cloud storage anytime.


Keywords


Cloud storage, data sharing, cipher texts, powerful aggregate key.

Full Text:

Untitled

References


REFERENCES

Cheng Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng , Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , IEEE Transaction on Parellel and Distributed System, vol. 25, no. 2, February 2014.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, “ Privacy- Preserving Public Auditing for Secure Cloud Storage ,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.

Milind Mathur, Ayush Kesarwani, ” comparison between DES , 3DES , RC2 , RC6 , Blowfish and AES, ” Proceedings of National Conference on New Horizons in IT - NCNHIT 2013.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” Proc. ACM Workshop Cloud Computing Security (CCSW ’09), pp. 103-114, 2009

M. Evans, T. Huynh, K. Le and M. Singh,” Cloud Storage”, 2011.

S. S. M. Chow, Y. Dodis, Y. Rouselakis and B. Waters, “Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,” Proc. ACM Conf. Computer and Comm. Security, pp. 152-161, 2010.

M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. ACM Conf. Computer and Comm. Security, pp. 121-130. 2009.

B. Alomair and R. Poovendran, “Information Theoretically Secure Encryption with Almost Free Authentication,” J. Universal Computer Science, volume 15, Issue 15, pp. 2937-2956, 2009.

Y. Sun and K. J. R. Liu, “Scalable Hierarchical Access Control in Secure Group Communications,” Proc. IEEE INFOCOM ’04, 2004.

S.S.M. Chow, J. Weng, Y. Yang and R.H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” Proc. Progress in Cryptology, Volume 6055, pp. 316-332, 2010.

D. Boneh, C. Gentry and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,” Advances in Cryptology Conference, Volume 3621, pp. 258-275, 2005.

D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” Proc. Advances in Cryptology, volume 2139, pp. 213-229, 2001.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Trans. Information and System Security, Volume 9, Issue 1, pp. 1-30, 2006

A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Theory and Applications of Cryptographic Techniques, Volume 3494, pp. 457-473, 2005.


Refbacks

  • There are currently no refbacks.