Achieving Secured Group Data Sharing Using Key Aggregate Searchable Encryption

Authors(3) :-P. Rupini, Mohammed Alisha, Dr. D. Mohan Reddy

Data sharing is a critical usefulness in cloud storage. In this article, we portray the method for safely, effectively, and adaptable share Data with others in cloud storage. We portray new public key cryptosystems which create steady size cipher texts with the end goal that effective designation of decryption rights for any arrangement of cipher texts are conceivable. The oddity is that one can total any arrangement of secret keys and make them as conservative as a single key, however including the energy of all the keys being collected. As it were, the secret key holder can discharge a steady size total key for adaptable decisions of figure content set in cloud storage; however the other encrypted documents outside the set stay secret. This minimized total key can be helpfully sent to others or put away in a keen card with extremely constrained secure stockpiling. We give formal security investigation of our plans in the standard model. We likewise depict other utilization of our plans. Specifically, our plans give the primary public key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

P. Rupini
PG Scholar, Dept. of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Mohammed Alisha
Associate Professor& Head of the Department, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. D. Mohan Reddy
Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

cryptosystem, encryption, cloud storage, public key, SHA algorithm, cipher text, drop box.

  1. C. Dong, G. Russello, N. Dulay. "Shared and searchable encrypted data for untrusted servers", Journal of Computer Security, pp. 367-397, 2011.
  2. F. Zhao, T. Nishide, K. Sakurai. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. Data Security and Cryptology, LNCS, pp. 406-418, 2012.
  3. J. W. Li, J. Li, X. F. Chen, et al. "Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud", In: Network and System Security 2012, LNCS, pp. 490- 502, 2012.
  4. J. Li, K. Kim. "Hidden attribute-based signatures without anonymity revocation", Data Sciences, 180(9): 1681-1689, Elsevier, 2010.
  5. X.F. Chen, J. Li, X.Y. Huang, J.W. Li, Y. Xiang. "Secure Outsourced Attribute-based Signatures", IEEE Trans. on Parallel and Cloud Systems, DOI.ieeecomputer-society.org /10.1109/TPDS.2013.180, 2013.
  6. J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. "Secure Deduplication with Efficient and Reliable Convergent Key Management", IEEE Transactions on Parallel and Cloud Systems, 25(6): 1615-1625, 2014.
  7. Z. Liu, Z. Wang, X. Cheng, et al. "Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud", Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013.
  8. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", Proc. IEEE INFOCOM, pp. 525-533, 2010.
  9. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing",Proc. IEEE INFOCOM, pp. 534-542, 2010.
  10. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance:The Essential of Bread and Butter of Data Forensics in Cloud Computing", Proc. ACM Symp. Data, Computer and Comm. Security, pp. 282-292, 2010
  11. X. Song, D.Wagner, A. Perrig. "Practical techniques for searches on encrypted data", IEEE Symposium on Security and Privacy,IEEE Press, pp. 44C55, 2000.
  12. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. "Searchable symmetric encryption: improved definitions and efficient constructions", In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79-88, 2006.
  13. S. Kamara, C. Papamanthou, T. Roeder. "Dynamic searchable symmetric encryption", Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965-976, 2012.
  14. D.Boneh, C. G, R. Ostrovsky, G. Persiano. "Public Key Encryption with Keyword Search", EUROCRYPT 2004, pp. 506C522,2004..
  15. Z. Liu, Z. Wang, X. Cheng, et al. "Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud", Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 441-445
Manuscript Number : CSEIT1831107
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

P. Rupini, Mohammed Alisha, Dr. D. Mohan Reddy, "Achieving Secured Group Data Sharing Using Key Aggregate Searchable Encryption", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.441-445 , January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831107

Article Preview

Follow Us

Contact Us