Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

Cloud computing is a technology which maintains the data and applications using the internet and central remote servers. Cloud computing allows consumer and businesses to use applications without any installation by using the internet they will access their personal files on any computer. Cloud storage is a service model in which data are maintained, managed and backed up remotely and made available to users over a network. Cloud storage can provide better accessibility, and reliability, strong protection, disaster recovery and lower cost. In proposing method a new public-key encryption is introduced which is called as Key-aggregate cryptosystem (KAC). Key-aggregate cryptosystem turn out constant size ciphertexts specified economical delegation of decoding rights for any set of ciphertext area unit attainable. Any set of secret keys can be aggregated and make them as single key, which holds the power of all the keys being aggregated. This aggregate key can be sent to the others via secured channels for decryption of ciphertext set and remaining encrypted files outside the set are remains confidential.

Authors and Affiliations

Keywords

Related Articles

Privacy Preservation in Cloud Using Attribute Based Encryption

Abstract- Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentica...

Social Work Intervention for Ex-Militants of Kashmir

The purpose of this paper is to develop a social work intervention plan for the rehabilitation of ex-militants of Kashmir. Social work intervention is a strategy by social workers offer intervention to individuals, famil...

Universo-Geo-Physics

"Gravity is a force of which all of us are aware. But is it possible that reverse of gravity is true? Yes. There is an equal possibility of the reverse being true. It can be termed negative gravity."

The Iraqi Kurdish Density after the Kurdish Movement Collapsed in March 1975

"The Kurdish wishes for a self-governing state was destroyed in March, when Kurdish leader Mullah Mustafa Barzani lost Iranian and U.S support and was forced to evacuate his forces from Iraq. Approximately two million Ku...

Temporal Analysis of Water Quality Evaluation using Fuzzy Logic and Ideal Point Analysis

Temporal Analysis of Water Quality Evaluation using Fuzzy Logic and Ideal Point Analysis

Download PDF file
  • EP ID EP366224
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

(2015). Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing. UNKNOWN, 4(4), -. https://europub.co.uk./articles/-A-366224