Secure Data Forwarding Using KAC

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

Cloud storage is nowadays very popular storage system. Cloud storage is a storage of data online in cloud which is accessible from multiple and connected resources. Cloud storage can provide good accessibility, reliability, strong protection, disaster recovery, and lowest cost. here describes how securely ,efficiently and flexibly sharing data with others in cloud storage. In modern cryptography, a primary problem often studied is that leveraging the secrecy of a small piece of knowledge into the ability to perform the cryptographic functions (e.g., encryption, authentication) multiple times making a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. This problem is solved by introducing a special type of public-key encryption which is called as key-aggregate cryptosystem (KAC).KAC produces constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. Any set of secret keys can be aggregated and make them as single key, which encompasses power of all the keys being aggregated. This aggregate key can be sent to the others for decryption of ciphertext set. The remaining encrypted files outside the set are remains confidential and secure. This compact aggregate key can be conveniently sent to others or to be stored in a smartcard with very limited storage. This scheme give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Keywords

Related Articles

Development of Mobile Data Encryption Mechanism in Cloud Environment

The use of mobile is not limited to calling only. The multiple use of application leads to requirement of comparatively large storage capacity which is big constraint of mobile device. Cloud storage can be used to overco...

To Study the Morphology of Pterion in Dry Human Skull in Vidarbha Region

: Eighty five (85) dry skulls were studied to find out the variations of Pterion. Sphenoparietal variety of Pterion was seen predominantly along with frontotemporal and stellate varieties. The importance of the pterion i...

A Neural Network Approach to Character Recognition

In this paper, an attempt is made to develop off-line recognition strategies for the isolated Handwritten English character(A to Z) and (0 to 9). Challenges in handwritten character recognition wholly lie in the variatio...

Clustering Techniques for Network lifetime Improvement: A Survey

This paper focuses on the theoretical aspects of clustering techniques in wireless sensor networks, as a mean to improve network lifetime and time synchronization between sensors. Wireless sensor networks (WSNs) are larg...

Role-Based IT-Access: Who Sets the Standards in German Internal Audit Departments?

Access management is essential for ensuring, that accounting-related ERP systems run according to the rules. Basics of legitimation and application requirements are established by laws and court judgements. The standards...

Download PDF file
  • EP ID EP356211
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

(2015). Secure Data Forwarding Using KAC. UNKNOWN, 4(2), -. https://europub.co.uk./articles/-A-356211