Downloads: 110 | Views: 281
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10
A Survey on Asymmetric Key Aggregate Encryption in Data Sharing
Shilpashree P, Dr. K. N. Narasimha Murthy
Abstract: Data sharing is the ability to share the same data resource with multiple applications or users. The data can be shared with others in a secure, efficient and economic way. Internet and cloud storages are rapidly growing day by day. So sharing of sensitive data through internet and cloud storage is an issue because there is a possibility of third party can steal the sensitive and confidential data. To overcome this problem data should be encrypted before sent across internet. Encryption is a technique of converting plaintext to ciphertext. Asymmetric is a kind of encryption which helps to share a data in a public key encryption, here the encryption key and decryption key are different. In this paper, the concept of aggregator key is introduced, which collects all the keys generated by the data owner and made it as a compact key. This compact key has consists of number of keys and using this aggregate key the data consumer can access only the data who is authenticate.
Keywords: Asymmetric, Cloud storage, Data Sharing, Encryption, Key Aggregate
Edition: Volume 4 Issue 3, March 2015
Pages: 1925 - 1928
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash