Double Encryption and Key Aggregation on Virtual Cloud

Authors

  • Shivraj Godle  Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
  • Sandip Kakade  Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
  • Kundan Ithape  Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India
  • Sushil Giri  Department of Computer Engineering, Pune University/SAE Kondhawa/Pune, Maharashtra, India

Keywords:

Encryption, Cloud Computing, Key Generation, Decryption

Abstract

Cloud computing is one of the fastest growing internet based technology that gives users to utilize services by making use of large poll of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. In the double encryption and key aggregation on virtual cloud there is two method we will implement that are double encryption and key aggregation. Double encryption is the process in which we have to implement the process, which can encrypt the file at the time of uploading. After that when we have to download it will decrypt automatically by system with OTD. Despite the popularity of cloud computing, it faces many difficulties such as security that is one of the major inhibitors in the growth of cloud computing. Data confidentiality is at the top of the list of security concern for this technology. Here in this project we have another concept that is key aggregation, in that any user can send request for multiple file and user will allow access. Then User can download the file throw otd comes throw message on mobile. In the key aggregation, multiple keys for various file can be aggregated and user will get the OTD for one time download.

References

  1. A. Sahai and B. Waters. Fuzzy identity based encryption. In EUROCRYPT, pages 457473, 2005.
  2. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data,” in New York, NY, USA: ACM, 2006.
  3. J. Bettencourt, A. Sahai, and B. Waters, Cipher text-policy attribute based encryption,” in Security and Privacy, 2007. IEEE Symposium.
  4. L. Cheung and C. Newport, Provably secure cipher text policy abe, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 456465.
  5. B. Waters, Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization, in Public Key Cryptography PKC 2011. Springer, 2011, pp. 5370.
  6. J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing,” in IEEE Second International Conference on, 2010
  7. C. Wang, X. Liu, and W. Li, Implementing a personal health record cloud platform using cipher text-policy attribute-based encryption,” in 4th International Conference on, 2012, pp. 8-14.
  8. S. Yu, C.Wang, K. Ren, and W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE, 2010.
  9. S. Yu, C. Wang, K. Ren, W. Lou: Attribute based data sharing with attribute revocation. In: ASIACCS (2010).
  10. Z. Wan, J. Liu, R. H. Deng, ”HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5]

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Shivraj Godle, Sandip Kakade, Kundan Ithape, Sushil Giri, " Double Encryption and Key Aggregation on Virtual Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.695-698, March-April-2017.