Downloads: 114 | Views: 276
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 12, December 2016 | Popularity: 7 / 10
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
Smital Erande, V. S. Ranmalkar
Abstract: Over incidental information spills in the cloud there might enormously wide security worries with various clients through open distributed storage due to the capacity of specifically scrambled information sharing. In the effective encryption keys administration, to generate such encryption plans, falsehoods is a key test. For various records, with any gathering of clients requests for diverse encryption keys, any gathering of those documents to be utilized the fancied adaptability of sharing. In any case, for both encryption and pursuit, to clients countless the need of disseminating safely and to safely store the got keys likewise suggests those clients will have and to perform seek over the common information submit to the cloud all together a just as vast number of watchword trapdoors. The methodology is not feasible for the inferred requirement for secure stockpiling, multifaceted nature and correspondence unmistakably renders. In this paper, by idea instantiating through the plan of a solid KASE and proposing the idea of key-total searchable encryption (KASE), we address this down to earth issue. In the writing this issue was generally dis-regarded, in which countless sharing to a client, there necessities just to appropriate a solitary key an information proprietor, and the client requirements for questioning the mutual archives for presenting a solitary trapdoor to the cloud.
Keywords: Searchable encryption, data sharing, cloud storage, data privacy
Edition: Volume 5 Issue 12, December 2016
Pages: 1793 - 1797
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 1127 - 1135Generative Artificial Intelligence: Unveiling the Potential and Challenges
Brahmaleen Kaur Sidhu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1758 - 1765Enhancing Corporate Financial Performance Through AI: A Novel AI Model for Forecasting Organizational Risk Management, CRM, and Operational Efficiency
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N