Online Data Sharing Using Secure Key Aggregate Cryptosystem on Cloud

Authors

  • Supriya M  M.Tech in CS&E, VTU PG Centre, Mysuru, Karnataka, India
  • Pushpalatha R  Assistant Professor, DoS in CS&E, VTU PG Centre, Mysuru, Karnataka, India

Keywords:

Cloud, cryptosystem, encrypt, internet, decryption

Abstract

Sharing of data in cloud is widely used now a day. Cloud is used for storing data and applications on servers and accessing them through internet. Online data sharing for improved productivity and efficiency is one of the primary requirements today for any organization. In cloud, data is stored on single machine and this stored data shared among multiple users by different machines. To store and for sharing data securely cryptosystem is used. The data owner encrypt the data before it is upload to the cloud and then data decryption is done when user want to access it. In the existing system owner needs to generate individual key to the individual user. To overcome this problem in proposed system we generate an aggregate key and broadcast.

References

  1. Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy-preserving public auditing for secure cloud storage. Cryptology ePrint Archive, Report 2009/579, 2009.
  2. Sherman SM Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H Deng. Dynamic secure cloud storage with provenance. In Cryptography and Security: From Theory to Applications, pages 442–464. Springer, 2012.
  3. Erik C Shallman. Up in the air: Clarifying cloud storage protections. Intell. Prop. L. Bull., 19:49, 2014.
  4. Cheng-Kang Chu, Sherman SM Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H Deng. Key-aggregate cryptosystem for scalable data sharing in cloud storage. Parallel and Distributed Systems, IEEE Transactions on, 25(2):468–477, 2014.
  5. Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology–CRYPTO 2005, pages 258–275. Springer, 2005.
  6. D Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Veri?ably Encrypted Signatures from Bilinear Maps,” in ProceedingsofAdvancesinCryptology-EUROCRYPT’03, ser.LNCS, vol. 2656. Springer, 2003, pp. 416–432.
  7. M J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, “Dynamic and Efficient Key Management for Access Hierarchies,” ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, 2009.
  8. J Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” in Proceedings of ACM Workshop on Cloud Computing Security (CCSW ’09). ACM, 2009, pp. 103–114.
  9. F Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” in Proceedings of Information Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398.
  10. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89–98.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Supriya M, Pushpalatha R, " Online Data Sharing Using Secure Key Aggregate Cryptosystem on Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.08-11, May-June-2018.