International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 262

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.8 / 10


     

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B


Abstract: Cloud computing is a technology which maintains the data and applications using the internet and central remote servers. Cloud computing allows consumer and businesses to use applications without any installation by using the internet they will access their personal files on any computer. Cloud storage is a service model in which data are maintained, managed and backed up remotely and made available to users over a network. Cloud storage can provide better accessibility, and reliability, strong protection, disaster recovery and lower cost. In proposing method a new public-key encryption is introduced which is called as Key-aggregate cryptosystem (KAC). Key-aggregate cryptosystem turn out constant size ciphertexts specified economical delegation of decoding rights for any set of ciphertext area unit attainable. Any set of secret keys can be aggregated and make them as single key, which holds the power of all the keys being aggregated. This aggregate key can be sent to the others via secured channels for decryption of ciphertext set and remaining encrypted files outside the set are remains confidential.


Keywords: Cloud computing, Cloud storage, Ciphertext, Decryption, Encryption, Key-aggregate cryptosystem, secret key


Edition: Volume 4 Issue 4, April 2015


Pages: 1493 - 1496



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sakkubai M Horatti, Gopal B, "Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1493-1496, URL: https://www.ijsr.net/getabstract.php?paperid=SUB153288, DOI: https://www.doi.org/10.21275/SUB153288



Downloads: 656 | Views: 1998

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 714

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 693

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 696

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 683

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top