Double Encryption and Key Aggregation on Virtual Cloud

Authors(4) :-Shivraj Godle, Sandip Kakade, Kundan Ithape, Sushil Giri

Cloud computing is one of the fastest growing internet based technology that gives users to utilize services by making use of large poll of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. In the double encryption and key aggregation on virtual cloud there is two method we will implement that are double encryption and key aggregation. Double encryption is the process in which we have to implement the process, which can encrypt the file at the time of uploading. After that when we have to download it will decrypt automatically by system with OTD. Despite the popularity of cloud computing, it faces many difficulties such as security that is one of the major inhibitors in the growth of cloud computing. Data confidentiality is at the top of the list of security concern for this technology. Here in this project we have another concept that is key aggregation, in that any user can send request for multiple file and user will allow access. Then User can download the file throw otd comes throw message on mobile. In the key aggregation, multiple keys for various file can be aggregated and user will get the OTD for one time download.

Authors and Affiliations

Shivraj Godle
Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
Sandip Kakade
Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
Kundan Ithape
Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
Sushil Giri
Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India

Encryption, Cloud Computing, Key Generation, Decryption

  1. A. Sahai and B. Waters. Fuzzy identity based encryption. In EUROCRYPT, pages 457473, 2005.
  2. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data,” in New York, NY, USA: ACM, 2006.
  3. J. Bettencourt, A. Sahai, and B. Waters, Cipher text-policy attribute based encryption,” in Security and Privacy, 2007. IEEE Symposium.
  4. L. Cheung and C. Newport, Provably secure cipher text policy abe, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 456465.
  5. B. Waters, Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization, in Public Key Cryptography PKC 2011. Springer, 2011, pp. 5370.
  6. J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing,” in IEEE Second International Conference on, 2010
  7. C. Wang, X. Liu, and W. Li, Implementing a personal health record cloud platform using cipher text-policy attribute-based encryption,” in 4th International Conference on, 2012, pp. 8-14.
  8. S. Yu, C.Wang, K. Ren, and W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE, 2010.
  9. S. Yu, C. Wang, K. Ren, W. Lou: Attribute based data sharing with attribute revocation. In: ASIACCS (2010).
  10. Z. Wan, J. Liu, R. H. Deng, ”HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5]

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 695-698
Manuscript Number : CSEIT1722196
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Shivraj Godle, Sandip Kakade, Kundan Ithape, Sushil Giri, "Double Encryption and Key Aggregation on Virtual Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.695-698, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722196

Article Preview

Follow Us

Contact Us