SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 775
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
1Vijay Joseph A, 2Marrynal S Eastaff
1PG Scholar, PG Department of IT, Hindusthan College of Arts and Science
2Asst. Professor, PG Department of IT, Hindusthan College of Arts and Science
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Cloud Storage plays a vital role in data sharing. A
secure, efficient and flexible way to share data is discussed in
this paper. A new public-key cryptosystems which make
constant-size cipher texts such that efficient delegation of
decryption rights for any set of cipher text are hopeful. The
novelty is that one can collective any set of top covert keys and
build them as compact as a single key, but encompassing the
run of all the keys person aggregated. In extra conditions the
top secret key skill can let go a constant-size collective key for
flexible option of cipher book set in cloud storage, but the
other encrypted files external the set remain confidential.This
compact total key can be conveniently sent to others or be
stored in a smart card with very partial locked storage. We
give formal security analysis of our scheme in the average
model. We also describe other application of our schemes. In
exacting, our scheme gives the first public-key patient-
controlled encryption for stretchy pecking order, which was
yet to be known.
Index Terms—Cloud storage, data sharing, key
aggregate encryption, patient-controlled encryption.
1. INTRODUCTION
Cloud storeroom has emerged as a promise solution for
providing everywhere, convenient, and on-demandaccesses
to large amounts of data shared over the Internet. Today,
millions of users are sharing special data, such asphotosand
videos, with their friends through social network
applications based on cloud cargo space on a daily basis.
However, while enjoying the convenience of sharingdatavia
cloud storage, users are also progressively more concerned
about inadvertent numbers leaks in the cloud. Such data
leak, caused by a malicious enemy or a misbehaving cloud
operator, can typically lead to serious breaches of personal
privacy or business secrets (e.g., the recent high profile
incident of star photos being leaked in iCloud). To address
users’ concerns more potential data leaksin cloud storage, a
common draw near is for the data owner to encrypt all the
data before uploading them to the cloud, such that later the
encrypted data may be retrieve and decrypted by those who
have the decryption keys. Such a cloud cargo space is often
calling the cryptographic cloud storage [6]. However, the
encryption of numbers makes it tough for users to explore
and then selectively retrieve only the data containing given
keywords. A frequent solution is to employ a searchable
encryption (SE) scheme in which the data possessor is
required to encrypt potential keywords and upload them to
the cloud together with encrypted data, such that, for
retrieving data similar a keyword, the user will send the
corresponding keyword trapdoor to the cloud for drama
search over the encrypted data. First of all, the call for
selectively sharing encrypted data with unlike users (e.g.,
sharing a photo with certain friends in a social network
application, or division a business document with certain
colleagues on a cloud drive) usually demands unlike
encryption keys to be used for different files. However, this
imply the digit of keys that need to be strewn to users, both
for them to search over the encrypted files and to decrypt
the files, will be relative to the number of such files. Such a
large number of keys must not only be scattered to usersvia
secure channels, but also be securely stored andmanagedby
the users in their policy. In adding up, a large digit of
trapdoors must be generated by users and submit to the
cloud in order to perform a keyword search over many files.
The implied need for secure communication, storage, and
computational complexity may render such a system
inefficient and impractical. To hold up searchablegroupdata
sharing the main requirementsfor efficientkeymanagement
are twofold. First, a data owner only needs to distribute a
single amassed key (instead of a group of keys) to a user for
giving out any number of files. Second, the useronlyneedsto
submit a single aggregate trapdoor (instead of a set of
trapdoors) to the cloud for the theater keyword search over
any number of shared files. To the finest of our information,
the KASE plan wished-for in this paper is the first known
scheme that can satisfy both requirements (the key-
aggregate cryptosystem [4], which has inspired our employ
can satisfy the first must but not the second). Contributions
More specifically, our main gifts are as follows.
1) We first identify a common scaffold of key aggregate
searchable encryption (KASE) poised of seven polynomial
algorithms for safety stricture setup, key generation,
encryption, key extraction, trapdoor production, trapdoor
adjustment, and trapdoor testing. We then describe both
functional and security rations for designing a valid KASE
method.
(2) We then instantiate the KASE framework by designing a
concrete KASE scheme. After providing detailed
constructions for the seven algorithms, we analyze the
effectiveness of the scheme, and establish its security
through full study
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 776
.
Key aggregate searchable encryption.
(3) We converse various useful issues in building an actual
group data sharing system based on the proposed KASE
scheme, and price its performance. The evaluation confirms
our organism can meet the performance requirements of
useful applications
2. Key-AGGREGATE SEARCHABLE ENCRYPTION
(KASE)
Development of KASE plan ideas is adapted from paperslike
key-aggregate cryptosystem scheme [7] for scalable data
sharing and Multi-key searchable encryption scheme. This
was done to generate a single aggregate encryption key in
replacement of many numbers of individual independent
keys for each id uploaded by the data owner. Defining this
scheme each key which is used for thorough is connected
with a particular index of uploaded document. Creation of
aggregate key is ready by using the data owner’s master-
secret key with product of his/her public keys used for
encryption. Than confuse server can use single adjusted
aggregated trapdoor which wascreatedforeachsetofpaper.
3. KASE FRAMEWORK
It was describe in the above section, this KASE scheme
consists of seven algorithms.
(1) Setup : This algorithm is run by blur wine waiter to
setup all system parameters. Generate a bilinear mapping
based group sharing system, set the highestpossiblenumber
of documents available with the data owner.Twooperations
are compute which are random generator calculation and
selecting a one way hash function. Cloud server televisesthe
generated system parameter and communal key.
(2) Key generation: This algorithm is run by numbersowner
to generate his/her key pair which will be worn for
document encryption by the Encrypt algorithm.Inthispoint,
we have public key and master covert key along with the
generate key
(3) Encrypt : This algorithm is dart by dataownertoperform
data encryption and also create corresponding cipher texts
for all the documents which will be uploaded. For the create
the keyword cipher texts, it take the document file index,
randomly picks a searchable encryption key for each
document and generate a delta information. Itwillproducea
cipher book for a keyword, this generate cipher texts are
stored underneath shade server.
(4) Extract : This algorithm is run by data holder and
generating an aggregate searchable encryption key and this
key is send to all authorized user via a secure
communication guide. This Algorithm takesgivingasmaster
top secret key and generates an aggregatekeyasproduction.
Data owner than fling this total key to data users, so that
they can perform keyword searching over the joint
identification.
(5) Trapdoor: This algorithm is scamper by data user and
performskeyword searching by generate trapdoorOnlyone
single aggregate trapdoor is generated for a single keyword
which is use for searching.Than data user sends this
generate solo trapdoor and subset of in time papers.
(6) Adjust : This algorithm is lope by cloud head waiter and
creating right set of trapdoor. It accepts input as system
publicly to be had parameter, all documents index in the set
plus also solo aggregate trapdoor. It performs adjusting
process on the only aggregate trapdoor and output a new
right only trapdoor. This produced trapdoor willbe used for
next Test algorithm for performing keyword searchoverthe
shared collection of documents.
(7) Test : This algorithm is run by the cloud server. Cloud
server does a series of keyword searching byusingtheinput,
which is adjusted trapdoor and createsthedeltainformation
which is relevant to subset by using searchable encryption
key. Harvest produced will be binary, i.e. true or false values
after performing various computation.
(8)Key-aggregate searchable encryption (KASE) method of
data sharing, it consists of two types of users: Data owner
and Data user. facts owner is uploading n numbers of
documents to cloud server which are shared with the data
user. Generally, here documents is encrypted by a type pair,
this obtained key pair is changed into single aggregate key
by using data owner public key and master secret key. The
sole aggregate key produced is send to the data user via a
secure communication channel. Data user can perform
searching over the combined documents by generating
single aggregate trapdoor. For each searched word, it can
generate an summative trapdoor. If a match is obtained, the
common documents are unlocked and return to respective
authorized data user.. Key-Aggregate SearchableEncryption
Framework of Key-aggregate searchable encryption(KASE),
it consists of a data owner generates a single aggregate key
which was created by using data holder public key and
master secret key for encrypting the shared documents.This
single aggregate key produced is send to the data user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 777
through a safe and reverberation message channel. Then,
data user can perform searching over the shared papers by
generating single aggregate trapdoor, submitted this
trapdoor to the cloud server. Cloud server performs the
adjust algorithm/process by using the aggregate trapdoor
over the gathering of documents. Then, test algorithm is
performed to make certain that the respective requesterhas
the right to access them. If a match occurs, than shadeserver
will return the entire mutual ID to the respective data user.
4. CONCLUSION
With more mathematical tools, cryptographic schemes
are getting more versatile and often engagemultiplekeysfor
a single application. In this article, we consider how to
“squeeze” top secret keysin public-keycryptosystemswhich
support passing on of top secret key for different cipher text
course in cloud cargo space. Our go in the way of is extra
flexible than hierarchical type job which containeronlykeep
spaces if all key-holders share a like set of privileges. In
cloud storage, the amount of cipher texts usually grows
rapidly. So we have to keep enough nobody text classes for
the future extension. or else, we need to expand the public-
key. Although the parameter container be downloadedwith
cipher texts, it would be better if its size is autonomous of
the maximum number of cipher text module.
5. REFERENCES
[1] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving
Secure, Scalable, and Fine-Grained Data Access
Control in Cloud Computing”, Proc. IEEE INFOCOM,
pp. 534-542, 2010.
[2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure
Provenance: The Essential of Bread and Butter of
Data Forensics in Cloud Computing”, Proc. ACM
Symp. Information, Computer and Comm. Security,
pp. 282-292, 2010.
[3] X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure
multiowner data sharing for dynamic groupsin the
cloud”, IEEE Transactions on Parallel and
Distributed Systems, 2013, 24(6): 1182-1191.
[4] C. Chu, S. Chow,W. Tzeng, et al. “Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud
Storage”, IEEE Transactions on Parallel and
Distributed Systems, 2014, 25(2): 468-477.
[5] X. Song, D.Wagner, A. Perrig. “Practical techniques
for searches on encrypted data”, IEEE Symposium
on Security and Privacy, IEEE Press, pp. 44C55,
2000.
[6] R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky.
“Searchable symmetric encryption: improved
definitions and efficient constructions”, In:
Proceedings of the 13th ACM conference on
Computer and Communications Security, ACM
Press, pp. 79-88, 2006.
[7] P. Van,S. Sedghi, JM. Doumen. “Computationally
efficient searchable symmetric encryption”, Secure
Data Management, pp. 87-100, 2010.
[8] S. Kamara, C. Papamanthou, T. Roeder. “Dynamic
searchable symmetric encryption”, Proceedings of
the 2012 ACM conference on Computer and
communications security (CCS), ACM, pp. 965- 976,
2012.
[9] D. Boneh, C. G, R. Ostrovsky, G. Persiano. “PublicKey
Encryption with Keyword Search”, EUROCRYPT
2004, pp. 506C522, 2004.
[10] Y. Hwang, P. Lee. “Public Key Encryption with
Conjunctive Keyword Search and Its Extension to a
Multi-user System”, In:Pairing-Based Cryptography
C Pairing 2007, LNCS, pp. 2-22, 2007.
[11] S. G. Akl and P. D. Taylor, “Cryptographic Solutionto
a Problem of Access Control in a Hierarchy,” ACM
Transactions on Computer Systems (TOCS), vol. 1,
no. 3, pp. 239–248, 1983.
[12] G. C. Chick and S. E. Tavares, “Flexible Access
Control with Master Keys,” in Proceedings of
Advances in Cryptology – CRYPTO ’89, ser. LNCS,
vol. 435. Springer, 1989, pp. 316–322.
[13] W.-G. Tzeng, “A Time-Bound Cryptographic Key
Assignment Scheme for Access Control in a
Hierarchy,” IEEE Transactions on Knowledge and
Data Engineering (TKDE), vol. 14, no. 1, pp. 182–
188,2002.
[14] G. Ateniese, A. D. Santis, A. L. Ferrara, and B.
Masucci, “Provably-SecureTime-BoundHierarchical
Key Assignment Schemes,” J. Cryptology, vol.25,no.
2, pp. 243–270, 2012.
[15] R. S. Sandhu, “Cryptographic Implementation of a
Tree Hierarchy for Access Control,” Information
Processing Letters, vol. 27, no. 2, pp. 95–98, 1988.

More Related Content

What's hot

IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
Christopher Frenz
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
LeMeniz Infotech
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Nexgen Technology
 
Final 1st
Final 1stFinal 1st
Final 1st
gokulprema
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Sanjana Yemajala
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
Nahan Rahman
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
 

What's hot (20)

IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
Final 1st
Final 1stFinal 1st
Final 1st
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 

Similar to IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
IRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
 

Similar to IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage (20)

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Aiml ppt pdf.pdf on music recommendation system
Aiml ppt pdf.pdf on music recommendation systemAiml ppt pdf.pdf on music recommendation system
Aiml ppt pdf.pdf on music recommendation system
UdhavGupta6
 
07 - Method Statement for Plastering Works.pdf
07 - Method Statement for Plastering Works.pdf07 - Method Statement for Plastering Works.pdf
07 - Method Statement for Plastering Works.pdf
RAHEEL KHALID
 
THERMAL POWER PLANT its applications and advantages
THERMAL POWER PLANT its applications and advantagesTHERMAL POWER PLANT its applications and advantages
THERMAL POWER PLANT its applications and advantages
VikramSingh6251
 
sensor networks unit wise 4 ppt units ppt
sensor networks unit wise 4  ppt units pptsensor networks unit wise 4  ppt units ppt
sensor networks unit wise 4 ppt units ppt
sarikasatya
 
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Robert Pyke
 
CATIA V5 Automation VB script.........pdf
CATIA V5 Automation VB script.........pdfCATIA V5 Automation VB script.........pdf
CATIA V5 Automation VB script.........pdf
shahidad729
 
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Robert Pyke
 
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
gerogepatton
 
Predicting damage in notched functionally graded materials plates thr...
Predicting  damage  in  notched  functionally  graded  materials  plates  thr...Predicting  damage  in  notched  functionally  graded  materials  plates  thr...
Predicting damage in notched functionally graded materials plates thr...
Barhm Mohamad
 
UNIT-I-METAL CASTING PROCESSES -Manufact
UNIT-I-METAL CASTING PROCESSES -ManufactUNIT-I-METAL CASTING PROCESSES -Manufact
UNIT-I-METAL CASTING PROCESSES -Manufact
Mr.C.Dineshbabu
 
Mobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction processMobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction process
Swapnil Gharat
 
PBL _PPT _final year for engineerin student
PBL _PPT _final  year for engineerin studentPBL _PPT _final  year for engineerin student
PBL _PPT _final year for engineerin student
nikitalohar549
 
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxxDriving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
Tamara Johnson
 
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
IJAEMSJORNAL
 
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
Kiran Kumar Manigam
 
III B.TECH CSE_flutter Lab manual (1).docx
III B.TECH CSE_flutter Lab manual (1).docxIII B.TECH CSE_flutter Lab manual (1).docx
III B.TECH CSE_flutter Lab manual (1).docx
divijareddy0502
 
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdfr4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
ArunKumar750226
 
Protect YugabyteDB with Hashicorp Vault.pdf
Protect YugabyteDB with Hashicorp Vault.pdfProtect YugabyteDB with Hashicorp Vault.pdf
Protect YugabyteDB with Hashicorp Vault.pdf
Gwenn Etourneau
 
Machine Learning- Perceptron_Backpropogation_Module 3.pdf
Machine Learning- Perceptron_Backpropogation_Module 3.pdfMachine Learning- Perceptron_Backpropogation_Module 3.pdf
Machine Learning- Perceptron_Backpropogation_Module 3.pdf
Dr. Shivashankar
 
Database management system module -3 bcs403
Database management system module -3 bcs403Database management system module -3 bcs403
Database management system module -3 bcs403
Tharani4825
 

Recently uploaded (20)

Aiml ppt pdf.pdf on music recommendation system
Aiml ppt pdf.pdf on music recommendation systemAiml ppt pdf.pdf on music recommendation system
Aiml ppt pdf.pdf on music recommendation system
 
07 - Method Statement for Plastering Works.pdf
07 - Method Statement for Plastering Works.pdf07 - Method Statement for Plastering Works.pdf
07 - Method Statement for Plastering Works.pdf
 
THERMAL POWER PLANT its applications and advantages
THERMAL POWER PLANT its applications and advantagesTHERMAL POWER PLANT its applications and advantages
THERMAL POWER PLANT its applications and advantages
 
sensor networks unit wise 4 ppt units ppt
sensor networks unit wise 4  ppt units pptsensor networks unit wise 4  ppt units ppt
sensor networks unit wise 4 ppt units ppt
 
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
 
CATIA V5 Automation VB script.........pdf
CATIA V5 Automation VB script.........pdfCATIA V5 Automation VB script.........pdf
CATIA V5 Automation VB script.........pdf
 
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
Updated Limitations of Simplified Methods for Evaluating the Potential for Li...
 
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing R...
 
Predicting damage in notched functionally graded materials plates thr...
Predicting  damage  in  notched  functionally  graded  materials  plates  thr...Predicting  damage  in  notched  functionally  graded  materials  plates  thr...
Predicting damage in notched functionally graded materials plates thr...
 
UNIT-I-METAL CASTING PROCESSES -Manufact
UNIT-I-METAL CASTING PROCESSES -ManufactUNIT-I-METAL CASTING PROCESSES -Manufact
UNIT-I-METAL CASTING PROCESSES -Manufact
 
Mobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction processMobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction process
 
PBL _PPT _final year for engineerin student
PBL _PPT _final  year for engineerin studentPBL _PPT _final  year for engineerin student
PBL _PPT _final year for engineerin student
 
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxxDriving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
Driving Safety.pptxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
Agricultural Profitability through Resilience: Smallholder Farmers' Strategie...
 
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
RAILWAYS, a vital part of our infrastructure, play a crucial role in ensuring...
 
III B.TECH CSE_flutter Lab manual (1).docx
III B.TECH CSE_flutter Lab manual (1).docxIII B.TECH CSE_flutter Lab manual (1).docx
III B.TECH CSE_flutter Lab manual (1).docx
 
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdfr4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
r4.OReilly.Hadoop.The.Definitive.Guide.4th.Edition.2015.pdf
 
Protect YugabyteDB with Hashicorp Vault.pdf
Protect YugabyteDB with Hashicorp Vault.pdfProtect YugabyteDB with Hashicorp Vault.pdf
Protect YugabyteDB with Hashicorp Vault.pdf
 
Machine Learning- Perceptron_Backpropogation_Module 3.pdf
Machine Learning- Perceptron_Backpropogation_Module 3.pdfMachine Learning- Perceptron_Backpropogation_Module 3.pdf
Machine Learning- Perceptron_Backpropogation_Module 3.pdf
 
Database management system module -3 bcs403
Database management system module -3 bcs403Database management system module -3 bcs403
Database management system module -3 bcs403
 

IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 775 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 1Vijay Joseph A, 2Marrynal S Eastaff 1PG Scholar, PG Department of IT, Hindusthan College of Arts and Science 2Asst. Professor, PG Department of IT, Hindusthan College of Arts and Science ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Cloud Storage plays a vital role in data sharing. A secure, efficient and flexible way to share data is discussed in this paper. A new public-key cryptosystems which make constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher text are hopeful. The novelty is that one can collective any set of top covert keys and build them as compact as a single key, but encompassing the run of all the keys person aggregated. In extra conditions the top secret key skill can let go a constant-size collective key for flexible option of cipher book set in cloud storage, but the other encrypted files external the set remain confidential.This compact total key can be conveniently sent to others or be stored in a smart card with very partial locked storage. We give formal security analysis of our scheme in the average model. We also describe other application of our schemes. In exacting, our scheme gives the first public-key patient- controlled encryption for stretchy pecking order, which was yet to be known. Index Terms—Cloud storage, data sharing, key aggregate encryption, patient-controlled encryption. 1. INTRODUCTION Cloud storeroom has emerged as a promise solution for providing everywhere, convenient, and on-demandaccesses to large amounts of data shared over the Internet. Today, millions of users are sharing special data, such asphotosand videos, with their friends through social network applications based on cloud cargo space on a daily basis. However, while enjoying the convenience of sharingdatavia cloud storage, users are also progressively more concerned about inadvertent numbers leaks in the cloud. Such data leak, caused by a malicious enemy or a misbehaving cloud operator, can typically lead to serious breaches of personal privacy or business secrets (e.g., the recent high profile incident of star photos being leaked in iCloud). To address users’ concerns more potential data leaksin cloud storage, a common draw near is for the data owner to encrypt all the data before uploading them to the cloud, such that later the encrypted data may be retrieve and decrypted by those who have the decryption keys. Such a cloud cargo space is often calling the cryptographic cloud storage [6]. However, the encryption of numbers makes it tough for users to explore and then selectively retrieve only the data containing given keywords. A frequent solution is to employ a searchable encryption (SE) scheme in which the data possessor is required to encrypt potential keywords and upload them to the cloud together with encrypted data, such that, for retrieving data similar a keyword, the user will send the corresponding keyword trapdoor to the cloud for drama search over the encrypted data. First of all, the call for selectively sharing encrypted data with unlike users (e.g., sharing a photo with certain friends in a social network application, or division a business document with certain colleagues on a cloud drive) usually demands unlike encryption keys to be used for different files. However, this imply the digit of keys that need to be strewn to users, both for them to search over the encrypted files and to decrypt the files, will be relative to the number of such files. Such a large number of keys must not only be scattered to usersvia secure channels, but also be securely stored andmanagedby the users in their policy. In adding up, a large digit of trapdoors must be generated by users and submit to the cloud in order to perform a keyword search over many files. The implied need for secure communication, storage, and computational complexity may render such a system inefficient and impractical. To hold up searchablegroupdata sharing the main requirementsfor efficientkeymanagement are twofold. First, a data owner only needs to distribute a single amassed key (instead of a group of keys) to a user for giving out any number of files. Second, the useronlyneedsto submit a single aggregate trapdoor (instead of a set of trapdoors) to the cloud for the theater keyword search over any number of shared files. To the finest of our information, the KASE plan wished-for in this paper is the first known scheme that can satisfy both requirements (the key- aggregate cryptosystem [4], which has inspired our employ can satisfy the first must but not the second). Contributions More specifically, our main gifts are as follows. 1) We first identify a common scaffold of key aggregate searchable encryption (KASE) poised of seven polynomial algorithms for safety stricture setup, key generation, encryption, key extraction, trapdoor production, trapdoor adjustment, and trapdoor testing. We then describe both functional and security rations for designing a valid KASE method. (2) We then instantiate the KASE framework by designing a concrete KASE scheme. After providing detailed constructions for the seven algorithms, we analyze the effectiveness of the scheme, and establish its security through full study
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 776 . Key aggregate searchable encryption. (3) We converse various useful issues in building an actual group data sharing system based on the proposed KASE scheme, and price its performance. The evaluation confirms our organism can meet the performance requirements of useful applications 2. Key-AGGREGATE SEARCHABLE ENCRYPTION (KASE) Development of KASE plan ideas is adapted from paperslike key-aggregate cryptosystem scheme [7] for scalable data sharing and Multi-key searchable encryption scheme. This was done to generate a single aggregate encryption key in replacement of many numbers of individual independent keys for each id uploaded by the data owner. Defining this scheme each key which is used for thorough is connected with a particular index of uploaded document. Creation of aggregate key is ready by using the data owner’s master- secret key with product of his/her public keys used for encryption. Than confuse server can use single adjusted aggregated trapdoor which wascreatedforeachsetofpaper. 3. KASE FRAMEWORK It was describe in the above section, this KASE scheme consists of seven algorithms. (1) Setup : This algorithm is run by blur wine waiter to setup all system parameters. Generate a bilinear mapping based group sharing system, set the highestpossiblenumber of documents available with the data owner.Twooperations are compute which are random generator calculation and selecting a one way hash function. Cloud server televisesthe generated system parameter and communal key. (2) Key generation: This algorithm is run by numbersowner to generate his/her key pair which will be worn for document encryption by the Encrypt algorithm.Inthispoint, we have public key and master covert key along with the generate key (3) Encrypt : This algorithm is dart by dataownertoperform data encryption and also create corresponding cipher texts for all the documents which will be uploaded. For the create the keyword cipher texts, it take the document file index, randomly picks a searchable encryption key for each document and generate a delta information. Itwillproducea cipher book for a keyword, this generate cipher texts are stored underneath shade server. (4) Extract : This algorithm is run by data holder and generating an aggregate searchable encryption key and this key is send to all authorized user via a secure communication guide. This Algorithm takesgivingasmaster top secret key and generates an aggregatekeyasproduction. Data owner than fling this total key to data users, so that they can perform keyword searching over the joint identification. (5) Trapdoor: This algorithm is scamper by data user and performskeyword searching by generate trapdoorOnlyone single aggregate trapdoor is generated for a single keyword which is use for searching.Than data user sends this generate solo trapdoor and subset of in time papers. (6) Adjust : This algorithm is lope by cloud head waiter and creating right set of trapdoor. It accepts input as system publicly to be had parameter, all documents index in the set plus also solo aggregate trapdoor. It performs adjusting process on the only aggregate trapdoor and output a new right only trapdoor. This produced trapdoor willbe used for next Test algorithm for performing keyword searchoverthe shared collection of documents. (7) Test : This algorithm is run by the cloud server. Cloud server does a series of keyword searching byusingtheinput, which is adjusted trapdoor and createsthedeltainformation which is relevant to subset by using searchable encryption key. Harvest produced will be binary, i.e. true or false values after performing various computation. (8)Key-aggregate searchable encryption (KASE) method of data sharing, it consists of two types of users: Data owner and Data user. facts owner is uploading n numbers of documents to cloud server which are shared with the data user. Generally, here documents is encrypted by a type pair, this obtained key pair is changed into single aggregate key by using data owner public key and master secret key. The sole aggregate key produced is send to the data user via a secure communication channel. Data user can perform searching over the combined documents by generating single aggregate trapdoor. For each searched word, it can generate an summative trapdoor. If a match is obtained, the common documents are unlocked and return to respective authorized data user.. Key-Aggregate SearchableEncryption Framework of Key-aggregate searchable encryption(KASE), it consists of a data owner generates a single aggregate key which was created by using data holder public key and master secret key for encrypting the shared documents.This single aggregate key produced is send to the data user
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 777 through a safe and reverberation message channel. Then, data user can perform searching over the shared papers by generating single aggregate trapdoor, submitted this trapdoor to the cloud server. Cloud server performs the adjust algorithm/process by using the aggregate trapdoor over the gathering of documents. Then, test algorithm is performed to make certain that the respective requesterhas the right to access them. If a match occurs, than shadeserver will return the entire mutual ID to the respective data user. 4. CONCLUSION With more mathematical tools, cryptographic schemes are getting more versatile and often engagemultiplekeysfor a single application. In this article, we consider how to “squeeze” top secret keysin public-keycryptosystemswhich support passing on of top secret key for different cipher text course in cloud cargo space. Our go in the way of is extra flexible than hierarchical type job which containeronlykeep spaces if all key-holders share a like set of privileges. In cloud storage, the amount of cipher texts usually grows rapidly. So we have to keep enough nobody text classes for the future extension. or else, we need to expand the public- key. Although the parameter container be downloadedwith cipher texts, it would be better if its size is autonomous of the maximum number of cipher text module. 5. REFERENCES [1] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010. [2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing”, Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010. [3] X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure multiowner data sharing for dynamic groupsin the cloud”, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191. [4] C. Chu, S. Chow,W. Tzeng, et al. “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468-477. [5] X. Song, D.Wagner, A. Perrig. “Practical techniques for searches on encrypted data”, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000. [6] R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. “Searchable symmetric encryption: improved definitions and efficient constructions”, In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79-88, 2006. [7] P. Van,S. Sedghi, JM. Doumen. “Computationally efficient searchable symmetric encryption”, Secure Data Management, pp. 87-100, 2010. [8] S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric encryption”, Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965- 976, 2012. [9] D. Boneh, C. G, R. Ostrovsky, G. Persiano. “PublicKey Encryption with Keyword Search”, EUROCRYPT 2004, pp. 506C522, 2004. [10] Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System”, In:Pairing-Based Cryptography C Pairing 2007, LNCS, pp. 2-22, 2007. [11] S. G. Akl and P. D. Taylor, “Cryptographic Solutionto a Problem of Access Control in a Hierarchy,” ACM Transactions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239–248, 1983. [12] G. C. Chick and S. E. Tavares, “Flexible Access Control with Master Keys,” in Proceedings of Advances in Cryptology – CRYPTO ’89, ser. LNCS, vol. 435. Springer, 1989, pp. 316–322. [13] W.-G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 14, no. 1, pp. 182– 188,2002. [14] G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci, “Provably-SecureTime-BoundHierarchical Key Assignment Schemes,” J. Cryptology, vol.25,no. 2, pp. 243–270, 2012. [15] R. S. Sandhu, “Cryptographic Implementation of a Tree Hierarchy for Access Control,” Information Processing Letters, vol. 27, no. 2, pp. 95–98, 1988.