Downloads: 133 | Views: 324
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.5 / 10
A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology
Rushikesh V.Mahalle, Prof. Parnal P.Pawade
Abstract: Data sharing is an important functionality in cloud storage. I show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. I describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. So I provide formal security analysis of our schemes in the standard model. I also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Keywords: Cloud storage, data sharing, key-aggregate encryption, patient-controlled encryption
Edition: Volume 3 Issue 12, December 2014
Pages: 2694 - 2697
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 133 | Views: 324
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.5 / 10
A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology
Rushikesh V.Mahalle, Prof. Parnal P.Pawade
Abstract: Data sharing is an important functionality in cloud storage. I show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage. I describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the force of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. So I provide formal security analysis of our schemes in the standard model. I also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Keywords: Cloud storage, data sharing, key-aggregate encryption, patient-controlled encryption
Edition: Volume 4 Issue 1, January 2015
Pages: 210 - 213
Make Sure to Disable the Pop-Up Blocker of Web Browser