International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 281

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10


     

A Survey on Asymmetric Key Aggregate Encryption in Data Sharing

Shilpashree P, Dr. K. N. Narasimha Murthy


Abstract: Data sharing is the ability to share the same data resource with multiple applications or users. The data can be shared with others in a secure, efficient and economic way. Internet and cloud storages are rapidly growing day by day. So sharing of sensitive data through internet and cloud storage is an issue because there is a possibility of third party can steal the sensitive and confidential data. To overcome this problem data should be encrypted before sent across internet. Encryption is a technique of converting plaintext to ciphertext. Asymmetric is a kind of encryption which helps to share a data in a public key encryption, here the encryption key and decryption key are different. In this paper, the concept of aggregator key is introduced, which collects all the keys generated by the data owner and made it as a compact key. This compact key has consists of number of keys and using this aggregate key the data consumer can access only the data who is authenticate.


Keywords: Asymmetric, Cloud storage, Data Sharing, Encryption, Key Aggregate


Edition: Volume 4 Issue 3, March 2015


Pages: 1925 - 1928



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shilpashree P, Dr. K. N. Narasimha Murthy, "A Survey on Asymmetric Key Aggregate Encryption in Data Sharing", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1925-1928, https://www.ijsr.net/getabstract.php?paperid=SUB152535, DOI: https://www.doi.org/10.21275/SUB152535



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top