Secure Data Forwarding Using KAC

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

Cloud storage is nowadays very popular storage system. Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can provide good accessibility, reliability, strong protection, disaster recovery, and lowest cost. here describes how securely ,efficiently and flexibly sharing data with others in cloud storage. In modern cryptography, a primary problem often studied is that leveraging the secrecy of a small piece of knowledge into the ability to perform the cryptographic functions (e.g., encryption, authentication) multiple times making a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. This problem is solved by introducing a special type of public-key encryption which is called as key-aggregate cryptosystem (KAC).KAC produces constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. Any set of secret keys can be aggregated and make them as single key, which encompasses power of all the keys being aggregated. This aggregate key can be sent to the others for decryption of ciphertext set. The remaining encrypted files outside the set are remains confidential and secure. This compact aggregate key can be conveniently sent to others or to be stored in a smartcard with very limited storage. This scheme give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Who and Where Should they turn to? The Plight of Street Children

This paper was motivated by observation(s) of pathetic scenes of street children looking for food in waste bins; teenage 'street mothers

"Simplified Fuzzy Logic Controller Design for Higher Order Processes"

Several industrial processes are getting complicated day by day introducing an unstable higher order models. The proportional integral derivative (PID) controller is the most widely used control strategy in industry due...

?The Nastiest Form of Child Workers in the Brick Fields ? the Mistreatment to Society and Nation?: A Case Study on Khejuri CD Blocks of Purba Medinipur District in West Bengal

Social norms and economic realities mean that child labor is widely accepted and very common in India. Many families rely on the income generated by their children for survival, so child labor is often highly valued. Add...

Evaluation of Obstetric Ultrasound Biological Hazard

"Ultrasound examination for pregnant women is related to some physical parameters which depends on the ultrasound examination device as well as on some physical properties of the examined women. The relation between thes...

Non-Cpap Conservative Treatment Alternatives for Patients with Obstructive Sleep Apnea/Hypopnea Syndrome

Obstructive Sleep Apnea is a challenging issue for diagnosis and treatment. Considering the significant co-morbidity and mortality OSA poses a serious issue. Throughout the years a great variety of therapeutic modalities...

Download PDF file
  • EP ID EP356211
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

(2015). Secure Data Forwarding Using KAC. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk./articles/-A-356211