Achieving Secured Group Data Sharing Using Key Aggregate Searchable Encryption

Authors

  • P. Rupini  PG Scholar, Dept. of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Mohammed Alisha  Associate Professor& Head of the Department, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Dr. D. Mohan Reddy  Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Keywords:

cryptosystem, encryption, cloud storage, public key, SHA algorithm, cipher text, drop box.

Abstract

Data sharing is a critical usefulness in cloud storage. In this article, we portray the method for safely, effectively, and adaptable share Data with others in cloud storage. We portray new public key cryptosystems which create steady size cipher texts with the end goal that effective designation of decryption rights for any arrangement of cipher texts are conceivable. The oddity is that one can total any arrangement of secret keys and make them as conservative as a single key, however including the energy of all the keys being collected. As it were, the secret key holder can discharge a steady size total key for adaptable decisions of figure content set in cloud storage; however the other encrypted documents outside the set stay secret. This minimized total key can be helpfully sent to others or put away in a keen card with extremely constrained secure stockpiling. We give formal security investigation of our plans in the standard model. We likewise depict other utilization of our plans. Specifically, our plans give the primary public key patient-controlled encryption for flexible hierarchy, which was yet to be known.

References

  1. C. Dong, G. Russello, N. Dulay. "Shared and searchable encrypted data for untrusted servers", Journal of Computer Security, pp. 367-397, 2011.
  2. F. Zhao, T. Nishide, K. Sakurai. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. Data Security and Cryptology, LNCS, pp. 406-418, 2012.
  3. J. W. Li, J. Li, X. F. Chen, et al. "Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud", In: Network and System Security 2012, LNCS, pp. 490- 502, 2012.
  4. J. Li, K. Kim. "Hidden attribute-based signatures without anonymity revocation", Data Sciences, 180(9): 1681-1689, Elsevier, 2010.
  5. X.F. Chen, J. Li, X.Y. Huang, J.W. Li, Y. Xiang. "Secure Outsourced Attribute-based Signatures", IEEE Trans. on Parallel and Cloud Systems, DOI.ieeecomputer-society.org /10.1109/TPDS.2013.180, 2013.
  6. J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. "Secure Deduplication with Efficient and Reliable Convergent Key Management", IEEE Transactions on Parallel and Cloud Systems, 25(6): 1615-1625, 2014.
  7. Z. Liu, Z. Wang, X. Cheng, et al. "Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud", Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013.
  8. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", Proc. IEEE INFOCOM, pp. 525-533, 2010.
  9. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing",Proc. IEEE INFOCOM, pp. 534-542, 2010.
  10. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance:The Essential of Bread and Butter of Data Forensics in Cloud Computing", Proc. ACM Symp. Data, Computer and Comm. Security, pp. 282-292, 2010
  11. X. Song, D.Wagner, A. Perrig. "Practical techniques for searches on encrypted data", IEEE Symposium on Security and Privacy,IEEE Press, pp. 44C55, 2000.
  12. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. "Searchable symmetric encryption: improved definitions and efficient constructions", In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79-88, 2006.
  13. S. Kamara, C. Papamanthou, T. Roeder. "Dynamic searchable symmetric encryption", Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965-976, 2012.
  14. D.Boneh, C. G, R. Ostrovsky, G. Persiano. "Public Key Encryption with Keyword Search", EUROCRYPT 2004, pp. 506C522,2004..
  15. Z. Liu, Z. Wang, X. Cheng, et al. "Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud", Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
P. Rupini, Mohammed Alisha, Dr. D. Mohan Reddy, " Achieving Secured Group Data Sharing Using Key Aggregate Searchable Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.441-445 , January-February-2018.