73 research outputs found

    A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE

    Get PDF
    Security concerns over inadvertent data leaks in the cloud may greatly ease the capability of selectively sharing encrypted data with different users via public cloud storage. So designing such an encryption schemes is a key challenge which lies in the efficient management of encryption keys. When any group of selected documents need to share with any group of users a desired flexibility is required with demands different encryption keys, which are used for different documents. However this also indicates the need of securely sharing to users a large number of keys for encryption and search, and those users will have to safely save the received keys, and submit an equally large number of keywords trapdoors to the cloud in order to perform search over the shared data. The indicated purpose of safe communication, storage, and difficultly clearly renders the approach impractical. In this paper, we address this practical problem, which is greatly neglected in the literature, here we are proposing the new concept of key aggregate searchable encryption and instantiating the concept through a concrete KASE scheme. In this scheme, the documents are shared by just submitting a single trapdoor by the user to the cloud for querying and this single key is being received by the data owner for sharing large number of documents. Our proposed scheme can confirm prove both the safety as well as practically efficient channels by security analysis and performance evaluation. It can securely store and manage the users in their devices. In order to perform a keyword search over many files a large number of trapdoors must be generated by users and submitted to the cloud. Such a system with secure communication, storage and computational complexity may lead to inefficiency and impracticality

    An Efficient Residue Group Multiplication for the etaT Pairing over F3m

    Get PDF

    Comparative Study of Public-key cryptosystems in Cloud Storage

    Get PDF
    Cloud storage is a service model in which data is maintained, managed and backed up remotely and made available to users over a network (typically the Internet). Cloud storage can provide the benefits of greater accessibility and reliability. In cloud storage different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. As a result there is a need of effective method to share data securely among different users. This can be achieved using cryptography, which helps in encrypting the data to be stored in cloud storage to protect against unauthorized access. Here we introduce a public-key cryptosystem which produce ciphertexts of constant size such a way that an systematic assignment of decryption virtue for any number of ciphertexts are possible. The modernity is that one can combine a set of secret keys and make them as mini single key with holding the same ability of all the keys that are formed in each group. This compact aggregate key can be efficiently sent to others or to be stored in a smart card with little secure storage. DOI: 10.17762/ijritcc2321-8169.150314

    Secure Transmission To Remote Cooperative Groups With Minimized Communication Overhead

    Get PDF
    In Wireless Mesh networks there is a need to Multicast to a remote cooperative group using encrypted transmission. The existing paradigms failed to provide better efficiency and security in these kind of transmissions. A major challenge in devising such a system involves in achieving efficient usage of Bandwidth and Reducing the number of unintended receivers. In this paper we circumvent these obstacles and close this gap by involving a sender based algorithm .This new paradigm is a hybrid of traditional Multicasting, shortest path techniques and group key management. In such a system, for every source destination pair the protocol adaptively calculates the mean delays along all the utilized paths and avoid the paths with greater or equal mean delays. Which eventually reduces the usage of unwanted paths and also results in reducing the number of unintended receivers at a considerable rate. This approach efficiently deals with the computation overhead and usage of network resources. Further more our scheme provides better security by reducing the number of unintended receivers.

    RIGHT KEY CONVERSATION PROTOCOLS FOR SIMILAR NETWORK CATEGORIZER SYSTEMS

    Get PDF
    When using the growing utilization of very network-attached storage systems, several works has focussed on scalable security. Our purpose ought to be to design ingenious additionally to secure techniques of authenticated key exchange that will meet up particular requirements of parallel Network File System.  Our work focuses on present Internet standards particularly parallel Network File System using Kerberos to begin parallel session keys among clients and storage products. We produce a study of impracticality of key establishment for efficient many-to-many communications. The recommended techniques can decrease workload of metadata server by means of about fifty percent in comparison with provide Kerberos-based protocol, whereas achieving needed security characteristics additionally to keeping computational overhead at clients and storage products at practically low-level

    PROFICIENT REPLACE PROTOCOLS FOR EQUIVALENT FILE SYSTEMS

    Get PDF
    When using the growing use of very network-attached storage systems, several works has focussed on scalable security. Our purpose ought to be to design ingenious in addition to secure techniques of authenticated key exchange which gets together particular needs of parallel Network File System.  Our work focuses on present Internet standards particularly parallel Network File System using Kerberos to begin parallel session keys among clients and storage products. We produce a study of impracticality of key establishment for efficient many-to-many communications. The recommended techniques can decrease workload of metadata server by means of about 50 % in comparison with provide Kerberos-based protocol, whereas achieving needed security characteristics in addition to keeping computational overhead at clients and storage products at practically low-level

    CO-EXISTING NET-BASED IN SEQUENCE MODEL USING LOCKED PROTOCOLS

    Get PDF
    While using the growing utilization of very network-attached storage systems, several works has focussed on scalable security. Our purpose must be to design ingenious additionally to secure techniques of authenticated key exchange which will get together particular needs of parallel Network File System.  Our work concentrates on present Internet standards particularly parallel Network File System using Kerberos to start parallel session keys among clients and storage products. We create a study of impracticality of key establishment for efficient many-to-many communications. The suggested techniques can decrease workload of metadata server by way of about fifty percent in comparison to provide Kerberos-based protocol, whereas achieving needed security characteristics additionally to keeping computational overhead at clientsand storage products at practically low-level

    VALID KEY SWITCH PROTOCOLS FOR COMPARABLE COMPLEX FILE SYSTEMS

    Get PDF
    While using the growing usage of very network-attached storage systems, several works has focussed on scalable security. Our purpose must be to design ingenious furthermore to secure techniques of authenticated key exchange which will get together particular requirements of parallel Network File System.  Our work concentrates on present Internet standards particularly parallel Network File System using Kerberos to start parallel session keys among clients and storage products. We create a study of impracticality of key establishment for efficient many-to-many communications. The suggested techniques can decrease workload of metadata server by way of about 50 percent in comparison to provide Kerberos-based protocol, whereas achieving needed security characteristics furthermore to keeping computational overhead at clients and storage products at practically low-level

    FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING

    Get PDF
    Data discussing systems that derive from cloud storage has acquired attention within the recent occasions. Customers are furthermore taking pleasure in the practicality of discussing data by way of cloud storage and through this method customers are increasingly more concerned regarding accidental data leaks inside the cloud. These data leaks, caused using a malicious foe can typically result in severe breaches of private privacy. Within our work we advise a manuscript idea of key aggregate searchable file encryption by instantiating the idea completely via a concrete key aggregate searchable file encryption system. Here the information owner just must allocate a specific key perfectly into a user for discussing a large number of documents, and user simply must submit a specific trapdoor towards cloud for querying shared documents. The suggested system is applicable for just about any cloud storage that supports searchable group data discussing functionality
    corecore