Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Data Share In Drop Box Using Key-Aggregate Cryptosystem

E. Elamathi, Dr. ArokyRaju, K. Ravikumar

Abstract


Files discussing is definitely an crucial features inside cloud storage. In this paper, all of us display how you can safely and securely, effectively, and also flexibly share data along with some others inside cloud storage. All of us explain new public-key cryptosystems which generate constant-size cipher texts such that successful delegation associated with decryption proper rights for virtually every pair of cipher texts are usually feasible. The originality will be that certain could mixture virtually any pair of key recommendations and also cause them to become seeing that lightweight being a single essential, yet covering the facility of all recommendations getting aggregated. Basically, the key essential case could release a constant-size mixture essential regarding adaptable choices associated with cipher text occur cloud storage, but the some other encrypted records beyond your set keep on being confidential. This kind of lightweight mixture essential may be handily provided for some others or end up being kept within a clever minute card along with very restricted secure storage. Currently official protection investigation of our techniques from the normal product. All of us in addition explain some other application of our techniques. In particular, your techniques provide first public-key patient-controlled encryption regarding adaptable Pecking order that is still to be known.


Keywords


Cloud Safe-Keeping, Files Discussing, Key-Aggregate Encryption.

Full Text:

PDF

References


R.S. Sandhu, “Cryptographic Implementation of a Tree Hierarchy for Access Control,” Information Processing Letters, vol. 27, no. 2, pp. 95-98, 1988.

Y. Sun and K.J.R. Liu, “Scalable Hierarchical Access Control in Secure Group Communications,” Proc. IEEE INFOCOM ’04, 2004.

B. Wang, S.S.M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” Proc. IEEE 33rd Int’l Conf. Distributed Computing Systems (ICDCS), 2013.

S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.-M. Yiu,“SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment,” Proc. 10th Int’l Conf. Applied Cryptography and Network Security (ACNS), vol. 7341, pp. 526-543, 2012.

W.-G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Trans. Knowledge and Data Eng., vol. 14, no. 1, pp. 182-188, Jan./Feb. 2002.

C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.

G. Ateniese, A.D. Santis, A.L. Ferrara, and B. Masucci, “Provably- Secure Time-Bound Hierarchical Key Assignment Schemes,” J. Cryptology, vol. 25, no. 2, pp. 243-270, 2012.

L. Hardesty, Secure Computers Aren’t so Secure. MIT press, http:// www.physorg.com/news176107396.html, 2009.

S.S.M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R.H. Deng,“Dynamic Secure Cloud Storage with Provenance,” Cryptography and Security, pp. 442-464, Springer, 2012.

F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-Identity Single-Key Decryption without Random Oracles,” Proc. Information Security and Cryptology (Inscrypt ’07), vol. 4990, pp. 384-398, 2007.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), pp. 89-98, 2006.

S.G. Akl and P.D. Taylor, “Cryptographic Solution to a Problem of Access Control in a Hierarchy,” ACM Trans. Computer Systems, vol. 1, no. 3, pp. 239-248, 1983.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’03), pp. 416-432, 2003.

G.C. Chick and S.E. Tavares, “Flexible Access Control with Master Keys,” Proc. Advances in Cryptology (CRYPTO ’89), vol. 435, pp. 316-322, 1989.

M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken, “Dynamicand Efficient Key Management for Access Hierarchies,” ACM Trans. Information and System Security, vol. 12, no. 3, pp. 18:1-18:43, 2009.

J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” Proc. ACM Workshop Cloud Computing Security (CCSW ’09), pp. 103-114, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.