Secure Data Sharing With Efficient Cloud Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data We propose key-aggregate cryptosystem (KAC), a special type of public-key encryption. In KAC, users encrypt files not only under a public key and also with private key. In this we explain how to compress secret keys in public-key cryptosystem which supports delegation of secret keys for different cipher text classes in cloud storage.Our approach is more flexible than hierarchical key assignment which can only save spaces if all key-holders share a similar set of privileges.Here the aggregate key is of constant size. In addition, the proposed scheme is proven to be secure based on kmultilinear Decisional Diffie-Hellman assumption. On the other hand, we implement our scheme over the integers.
Authors and Affiliations
P. Danusha Chowdary, R. Pranutha, M. Sharmilla, Dr. S. Padma Priya
Implementation of UPFC for Improvement of Power Stability
The FACTS device which is usually called Unified Power Flow Controller (UPFC) can give synchronous control of basic power system parameters like voltage, flow of active power, flow of the reactive power, the impedance a...
Review paper of enhance the efficiency of the network by enhancing the error recovery by using the backup path in MPLS network
When data is transmitted at high speed through a cabled network, from any noise over the network or channel interference is introduce which causes heavy data loss. When data is transferring through a topology like bus o...
Trembling Based First Aid Device for Heart attack
According to the world health organization census 92% of heart attack death occurs during the time of bringing the heart victims to the hospital. So far there is no other handheld first aid device existing for heart att...
Modernizing ATM Security with Biometrics by Using LabVIEW
In today’s world the usage of currencies is moving towards virtual money. One of the at most important things that helped in making the transition towards virtual cash has been Automated Teller Machine (ATM). In order t...
Design of an Improve Cassava Peeling Machine
All the unit operations involved in the post-harvest processing of cassava such as grating, drying, milling, pressing, sieving, molding, extrusion and frying have been mechanized successfully. However, cassava peeling r...