A Secure and Scalable Data Sharing using Key Aggregate Crypto System
DOI:
https://doi.org/10.26438/ijcse/v5i10.342346Keywords:
Cloud storage, data sharing, key-aggregate encryption, patient-controlled encryptionAbstract
Today, gaining popularity privacy for accessing outsourcing data stored on cloud is a major issue in cloud computing. In cloud storage data is stored on single physical machine and this stored data may shared by multiple users from different machines. User doesn't have control on accessing outsourced data. For identification of leaked data to everyone data access security or privacy for data is a challenging section. To store as well for sharing data securely Cryptosystem is used. In cryptosystem before storing data on cloud user firstly encrypt data then placed it on cloud. And then data decryption is performed when user want to access it. This task may require multiple keys for data encryption as well as data decryption. In proposed system key-aggregation is implemented on concept on merging or aggregating the encryption and decryption key into single one in cryptosystem for sharing of scalable data. It is very compressed formed of aggregation of key. In proposed approach unique key can hold multiple keys that are required. In proposed system concentrate on sharing data securely, efficiently among multiple users. Sharing data and delegation of data is possible as fixed sized of data blocks are created. In this proposed system implements Shamir secret sharing algorithm for securely, sharing aggregate key for multiple users.
References
Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE transactions on parallel and distributed systems, 25(2), 468-477.
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hi-erarchies, ACM Transactions on Information and SystemSecurity (TISSEC), vol. 12, no. 3, 2009. 416432.
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient Controlled Encryption:, in Proceedings of ACM Work-shopCloud Computing. ACM, 2009, pp. 103114.
F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedingsof Information Security and Cryptology (Inscrypt 07), ser.LNCS, vol. 4990.Springer, 2007, pp. 384398.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of En-crypted data, in Proceedings of the 13th ACM conferenceon Computer security. ACM, 2006, pp. 8998.
S. G. Akl and P. D. Taylor, Cryptographic Solution to aProblem of Access Control in a Hierarchy, ACM Trans-actions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239-248, 1983.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
