Key-aggregate Cryptosystem for reliable data Outsourcing among Cloud Storage

SK. John Shaida, U. Usha Rani

Abstract


Cloud computing technology is widely used so that the data can be outsourced on the cloud can access easily. Different members can share that data through different virtual machines but present on the single physical machine. But the thing is user don’t have physical control over the outsourced data. The need is to share data securely among users. In this paper, we proposed a novel scheme that provides secure data storage and retrieval. Along with the security, the access policy is also hidden for hiding the user’s identity. This scheme is so powerful since we use key aggregation using the secure crypto algorithm. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but concluding the power of all the keys being aggregated. The scheme detects any change made to the original file and if found clear the error’s. And also address the number of cipher texts usually grows rapidly without any restrictions. So we have to reserve enough cipher text classes in another hand we need to expand the public-key. Although the parameter can be downloaded with cipher texts, it would be better if its size is independent of the maximum number of cipher text classes
Keywords: Aggregate key cryptosystem; Cloud storage; data sharing; key-aggregate encryption

Full Text:

PDF




Copyright (c) 2015 SK. John Shaida, U. Usha Rani

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org