Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem
Keywords:
Secure data sharing, TPA, Key aggregate cryptosystemAbstract
Cloud computing is used to store and share data by anyone from anywhere in the world. It provides scalable and on demand self services. The cloud data expect maximum security at rest state as well as at transit state. Service providers provide security to the data in the cloud and the data owner also uses some cryptographic techniques for data security. They may use symmetric cryptography or asymmetric cryptography. If the data owner use same cryptographic key for all data files, they cannot share the partial amount of data files. Because of that the owner using the separate encryption/ decryption keys for each file in the cloud. Here to provide security and avoid network burden, the data owner can aggregate all decryption keys into a single key. This aggregate key can decrypt any subset of delegated cipher text blocks.
References
S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.-M. Yiu, "SPICE- SimplePrivacy-Preserving Identity-Management for Cloud Environment," Proc. 10th Int"l Conf. Applied Cryptography and Network Security (ACNS), vol. 7341, pp. 526-543, 2012.
C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
F. Guo, Y. Mu, Z. Chen, and L. Xu, "Multi-Identity Single-Key Decryption without Random Oracles," Proc. Information Security and Cryptology (Inscrypt "07), vol. 4990, pp. 384-398, 2007.
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int"l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT "03), pp. 416-432, 2003.
G.C. Chick and S.E. Tavares, "Flexible Access Control with Master Keys," Proc. Advances in Cryptology (CRYPTO "89), vol. 435, pp. 316-322, 1989.
Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage," in Parallel And Distributed Systems, VOL. 25, NO. 2, pp. 468-477, 2014
Thamil kumaran V.C , Chithra Mol C.R , Sai Prasath, "An Impact of Implementing Various Cryptographic Techniques Efficiently in a Public Centric Cloud", Vol 4, Issue 4, 83-86
Jaydip Sen, "Security and Privacy Issues in cloud computing", Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA
Bharat Bhargava, Anya Kim,YounSun Cho "Research in Cloud Security and Privacy"
http://en.wikipedia.org/wiki/Cloud_computing.
L. Hardesty, Secure Computers Aren"t so Secure. MIT press, http://www.physorg.com/ news176107396.html, 2009.
B. Wang, S.S.M. Chow, M. Li, and H. Li, "Storing Shared Data on the Cloud via Security- Mediator," Proc. IEEE 33rd Int"l Conf. Distributed Computing Systems (ICDCS), 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
