SECURE DATA SHARING IN CLOUD USING KEY AGGREGATE CRYPTOSYSTEM
DOI:
https://doi.org/10.37547/ijasr-03-07-10Keywords:
Secure data sharing, cloud computing, key aggregate cryptosystemAbstract
Secure data sharing in the cloud is a critical concern to ensure the confidentiality and integrity of sensitive information stored in cloud environments. Key Aggregate Cryptosystem (KAC) is an emerging cryptographic technique that enables efficient and secure data sharing among multiple users in the cloud. This study focuses on the application of KAC for secure data sharing in cloud environments. The proposed approach utilizes a hierarchical key management scheme to generate and distribute encryption keys, allowing authorized users to access and decrypt shared data. The KAC framework ensures fine-grained access control and reduces the computational overhead associated with traditional encryption schemes. The study evaluates the security and performance aspects of the proposed approach through simulation and analysis, demonstrating its effectiveness in secure data sharing in the cloud.
Downloads
References
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. N., & Song, D. (2007). Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, 598-609.
Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2013). Aggregate and verifiably encrypted signatures from bilinear maps. Journal of Cryptology, 22(1), 1-34.
Chow, S. S., Setty, S. T. V., & Vu, L. (2009). Polynomial-based key management for access control in cloud storage systems. Proceedings of the ACM Cloud Computing Security Workshop, 11-16.
Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 895-934.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 89-98.
Liu, Q., Ning, H., & Li, J. (2012). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1632-1641.
Natarajan, A., & Yang, X. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131-143.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 457-473.
Singh, J., & Sharma, V. (2017). Secure data sharing in cloud computing using key aggregate cryptosystem. International Journal of Computer Science and Information Security, 15(6), 36-40.
Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the IEEE INFOCOM, 1-9.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Chetan Deelip Lomte

This work is licensed under a Creative Commons Attribution 4.0 International License.