Online Data Sharing Using Secure Key Aggregate Cryptosystem on Cloud

Authors(2) :-Supriya M, Pushpalatha R

Sharing of data in cloud is widely used now a day. Cloud is used for storing data and applications on servers and accessing them through internet. Online data sharing for improved productivity and efficiency is one of the primary requirements today for any organization. In cloud, data is stored on single machine and this stored data shared among multiple users by different machines. To store and for sharing data securely cryptosystem is used. The data owner encrypt the data before it is upload to the cloud and then data decryption is done when user want to access it. In the existing system owner needs to generate individual key to the individual user. To overcome this problem in proposed system we generate an aggregate key and broadcast.

Authors and Affiliations

Supriya M
M.Tech in CS&E, VTU PG Centre, Mysuru, Karnataka, India
Pushpalatha R
Assistant Professor, DoS in CS&E, VTU PG Centre, Mysuru, Karnataka, India

Cloud, cryptosystem, encrypt, internet, decryption

  1. Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy-preserving public auditing for secure cloud storage. Cryptology ePrint Archive, Report 2009/579, 2009.
  2. Sherman SM Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H Deng. Dynamic secure cloud storage with provenance. In Cryptography and Security: From Theory to Applications, pages 442–464. Springer, 2012.
  3. Erik C Shallman. Up in the air: Clarifying cloud storage protections. Intell. Prop. L. Bull., 19:49, 2014.
  4. Cheng-Kang Chu, Sherman SM Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H Deng. Key-aggregate cryptosystem for scalable data sharing in cloud storage. Parallel and Distributed Systems, IEEE Transactions on, 25(2):468–477, 2014.
  5. Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology–CRYPTO 2005, pages 258–275. Springer, 2005.
  6. D Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Veri?ably Encrypted Signatures from Bilinear Maps,” in ProceedingsofAdvancesinCryptology-EUROCRYPT’03, ser.LNCS, vol. 2656. Springer, 2003, pp. 416–432.
  7. M J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, “Dynamic and Efficient Key Management for Access Hierarchies,” ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, 2009.
  8. J Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in Proceedings of ACM Workshop on Cloud Computing Security (CCSW ’09). ACM, 2009, pp. 103–114.
  9. F Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” in Proceedings of Information Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398.
  10. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89–98.

Publication Details

Published in : Volume 4 | Issue 6 | May-June 2018
Date of Publication : 2018-05-08
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 08-11
Manuscript Number : CSEIT184603
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Supriya M, Pushpalatha R, "Online Data Sharing Using Secure Key Aggregate Cryptosystem on Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.08-11, May-June.2018
URL : http://ijsrcseit.com/CSEIT184603

Follow Us

Contact Us