SECURE DATA SHARING IN CLOUD USING KEY AGGREGATE CRYPTOSYSTEM

Authors

  • Chetan Deelip Lomte Student, Computer Science & Engineering, Everest College of Engineering & Technology, Aurangabad, India

DOI:

https://doi.org/10.37547/ijasr-03-07-10

Keywords:

Secure data sharing, cloud computing, key aggregate cryptosystem

Abstract

Secure data sharing in the cloud is a critical concern to ensure the confidentiality and integrity of sensitive information stored in cloud environments. Key Aggregate Cryptosystem (KAC) is an emerging cryptographic technique that enables efficient and secure data sharing among multiple users in the cloud. This study focuses on the application of KAC for secure data sharing in cloud environments. The proposed approach utilizes a hierarchical key management scheme to generate and distribute encryption keys, allowing authorized users to access and decrypt shared data. The KAC framework ensures fine-grained access control and reduces the computational overhead associated with traditional encryption schemes. The study evaluates the security and performance aspects of the proposed approach through simulation and analysis, demonstrating its effectiveness in secure data sharing in the cloud.

Downloads

Download data is not yet available.

References

Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. N., & Song, D. (2007). Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, 598-609.

Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2013). Aggregate and verifiably encrypted signatures from bilinear maps. Journal of Cryptology, 22(1), 1-34.

Chow, S. S., Setty, S. T. V., & Vu, L. (2009). Polynomial-based key management for access control in cloud storage systems. Proceedings of the ACM Cloud Computing Security Workshop, 11-16.

Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 895-934.

Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 89-98.

Liu, Q., Ning, H., & Li, J. (2012). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1632-1641.

Natarajan, A., & Yang, X. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131-143.

Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 457-473.

Singh, J., & Sharma, V. (2017). Secure data sharing in cloud computing using key aggregate cryptosystem. International Journal of Computer Science and Information Security, 15(6), 36-40.

Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of the IEEE INFOCOM, 1-9.

Downloads

Published

2023-07-17

How to Cite

SECURE DATA SHARING IN CLOUD USING KEY AGGREGATE CRYPTOSYSTEM. (2023). International Journal of Advance Scientific Research, 3(07), 55-59. https://doi.org/10.37547/ijasr-03-07-10

Similar Articles

1-10 of 126

You may also start an advanced similarity search for this article.