Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem

Authors

  • Ms.Minimol Mathew Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Mrs. D Sumathi Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Ms. P Ranjima Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu
  • Mr. P Sivaprakash Dept. of CSE, PPG Institute of Technology, Coimbatore, Tamil Nadu

Keywords:

Secure data sharing, TPA, Key aggregate cryptosystem

Abstract

Cloud computing is used to store and share data by anyone from anywhere in the world. It provides scalable and on demand self services. The cloud data expect maximum security at rest state as well as at transit state. Service providers provide security to the data in the cloud and the data owner also uses some cryptographic techniques for data security. They may use symmetric cryptography or asymmetric cryptography. If the data owner use same cryptographic key for all data files, they cannot share the partial amount of data files. Because of that the owner using the separate encryption/ decryption keys for each file in the cloud. Here to provide security and avoid network burden, the data owner can aggregate all decryption keys into a single key. This aggregate key can decrypt any subset of delegated cipher text blocks.

References

S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.-M. Yiu, "SPICE- SimplePrivacy-Preserving Identity-Management for Cloud Environment," Proc. 10th Int"l Conf. Applied Cryptography and Network Security (ACNS), vol. 7341, pp. 526-543, 2012.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.

F. Guo, Y. Mu, Z. Chen, and L. Xu, "Multi-Identity Single-Key Decryption without Random Oracles," Proc. Information Security and Cryptology (Inscrypt "07), vol. 4990, pp. 384-398, 2007.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int"l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT "03), pp. 416-432, 2003.

G.C. Chick and S.E. Tavares, "Flexible Access Control with Master Keys," Proc. Advances in Cryptology (CRYPTO "89), vol. 435, pp. 316-322, 1989.

Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage," in Parallel And Distributed Systems, VOL. 25, NO. 2, pp. 468-477, 2014

Thamil kumaran V.C , Chithra Mol C.R , Sai Prasath, "An Impact of Implementing Various Cryptographic Techniques Efficiently in a Public Centric Cloud", Vol 4, Issue 4, 83-86

Jaydip Sen, "Security and Privacy Issues in cloud computing", Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA

Bharat Bhargava, Anya Kim,YounSun Cho "Research in Cloud Security and Privacy"

http://en.wikipedia.org/wiki/Cloud_computing.

L. Hardesty, Secure Computers Aren"t so Secure. MIT press, http://www.physorg.com/ news176107396.html, 2009.

B. Wang, S.S.M. Chow, M. Li, and H. Li, "Storing Shared Data on the Cloud via Security- Mediator," Proc. IEEE 33rd Int"l Conf. Distributed Computing Systems (ICDCS), 2013.

http://en.wikipedia.org/wiki/Cloud_computing_security

Downloads

Published

2014-08-30

How to Cite

[1]
M. Mathew, M. D. Sumathi, M. P. Ranjima, and M. P. Sivaprakash, “Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem”, Int. J. Comp. Sci. Eng., vol. 2, no. 8, pp. 121–123, Aug. 2014.

Issue

Section

Short Communication