A Secure and Scalable Data Sharing using Key Aggregate Crypto System

Authors

  • Bharati A Patil Dept. of Computer Engineering, SITRC, SPPU University, Nashik, India

DOI:

https://doi.org/10.26438/ijcse/v5i10.342346

Keywords:

Cloud storage, data sharing, key-aggregate encryption, patient-controlled encryption

Abstract

Today, gaining popularity privacy for accessing outsourcing data stored on cloud is a major issue in cloud computing. In cloud storage data is stored on single physical machine and this stored data may shared by multiple users from different machines. User doesn't have control on accessing outsourced data. For identification of leaked data to everyone data access security or privacy for data is a challenging section. To store as well for sharing data securely Cryptosystem is used. In cryptosystem before storing data on cloud user firstly encrypt data then placed it on cloud. And then data decryption is performed when user want to access it. This task may require multiple keys for data encryption as well as data decryption. In proposed system key-aggregation is implemented on concept on merging or aggregating the encryption and decryption key into single one in cryptosystem for sharing of scalable data. It is very compressed formed of aggregation of key. In proposed approach unique key can hold multiple keys that are required. In proposed system concentrate on sharing data securely, efficiently among multiple users. Sharing data and delegation of data is possible as fixed sized of data blocks are created. In this proposed system implements Shamir secret sharing algorithm for securely, sharing aggregate key for multiple users.

References

Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE transactions on parallel and distributed systems, 25(2), 468-477.

M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hi-erarchies, ACM Transactions on Information and SystemSecurity (TISSEC), vol. 12, no. 3, 2009. 416432.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient Controlled Encryption:, in Proceedings of ACM Work-shopCloud Computing. ACM, 2009, pp. 103114.

F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedingsof Information Security and Cryptology (Inscrypt 07), ser.LNCS, vol. 4990.Springer, 2007, pp. 384398.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of En-crypted data, in Proceedings of the 13th ACM conferenceon Computer security. ACM, 2006, pp. 8998.

S. G. Akl and P. D. Taylor, Cryptographic Solution to aProblem of Access Control in a Hierarchy, ACM Trans-actions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239-248, 1983.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i10.342346
Published: 2025-11-12

How to Cite

[1]
B. A. Patil, “A Secure and Scalable Data Sharing using Key Aggregate Crypto System”, Int. J. Comp. Sci. Eng., vol. 5, no. 10, pp. 342–346, Nov. 2025.

Issue

Section

Research Article