20 research outputs found

    Development of Novel Encryption for Secured Data Sharing

    Full text link
    In cloud storage the data sharing is important one. Key-aggregate cryptosystem produce constant size cipher text . That is very efficient delegation rights of decryption for any set of cipher text are possible. Any set of secret keys can be aggregated and make them as single key, which groups all the key by making it a aggregate key. This aggregate key can be sent to the others for decryption of cipher text set and remaining .Encrypted files outside the set are remains confidential. Cloud storage could provide secured data sharin

    A Cryptographic Solution to the Predefind Bound of Ciphertext Classes in KAC

    Get PDF
    In Cloud Computingsecure data sharing is an important functionality. Cloud computing is the storing of data online which is accessible from multiple and connected resources. It is the fastest growing field in computer world which serves various services to users. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services. This paper attempts to show how data is shared among cloud users securely, efficiently, and flexibly. On cloud anyone can share data as much they want to i.e. only selected content can be shared. With cryptography users can share the data to others in safe way. So that user encrypts data and upload it on cloud server. The proposed algorithm uses a new cryptosystem that is called as Key Aggregate Cryptosystem (KAC)[1] which generates a single key for multiple files. In particular, it uses a public key encryption which releases aggregate key for set of secret keys. With this aggregate key others can decrypt ciphertext set and remaining encrypted files outside the set are remains confidential

    Comparative Study of Public-key cryptosystems in Cloud Storage

    Get PDF
    Cloud storage is a service model in which data is maintained, managed and backed up remotely and made available to users over a network (typically the Internet). Cloud storage can provide the benefits of greater accessibility and reliability. In cloud storage different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. As a result there is a need of effective method to share data securely among different users. This can be achieved using cryptography, which helps in encrypting the data to be stored in cloud storage to protect against unauthorized access. Here we introduce a public-key cryptosystem which produce ciphertexts of constant size such a way that an systematic assignment of decryption virtue for any number of ciphertexts are possible. The modernity is that one can combine a set of secret keys and make them as mini single key with holding the same ability of all the keys that are formed in each group. This compact aggregate key can be efficiently sent to others or to be stored in a smart card with little secure storage. DOI: 10.17762/ijritcc2321-8169.150314

    Efficient Security Solution for Privacy Cloud Services

    Get PDF
    In this paper, we exhibit a novel protection protecting security answer for cloud services. We manage client nameless access to cloud benefits and imparted stockpiling servers. Our answer furnishes enlisted clients with unacknowledged access to cloud services. Our answer offers unacknowledged verification. This implies that clients' close to home qualities (age, legitimate enrollment, fruitful installment) can be demonstrated without uncovering clients' character. Accordingly, clients can utilize services without any risk of profiling their conduct. Then again, if clients break supplier's tenets, their right to gain entrance rights are renounced. We dissect current security safeguarding answers for cloud services and layout our answer in light of cutting edge cryptographic segments. Our answer offers nameless access, unlinkability and the privacy of transmitted information. Also, we execute our answer and we yield the trial comes about and look at the execution with related arrangements

    A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

    Get PDF
    Abstract: The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible hierarchy, which was yet to be known

    Privacy-preserving security solution for cloud services

    Get PDF
    AbstractWe propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their behavior. However, if a user breaks provider's rules, his access right is revoked. Our solution provides anonymous access, unlinkability and the confidentiality of transmitted data. We implement our solution as a proof of concept applicationand present the experimental results. Further, we analyzecurrent privacy preserving solutions for cloud services and group signature schemes as basic parts of privacy enhancing solutions in cloud services. We compare the performance of our solution with the related solutionsand schemes

    Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud

    Get PDF
    Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian Network to evaluate the analytical result of forensics examinations. The proposed method can accurately and scientifically track down the origin infringing content uploader and owner. Keywords: cloud forensics, peer to peer, file sharing, tracking, CloudFron

    A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate

    Get PDF
    Of late, rapid growth observed in the cloud technology.  Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts is possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known

    Key-Aggregate Model Search for Group Data Sharing Using Patient-Controlled Encryption In Cloud

    Get PDF
    Cloud storage has risen as a promising tackling an issue for giving universal, helpful, and on-request gets to a lot of information shared over the Internet. Specifically, our plans give the main open key patient-controlled encryption for adaptable chain of importance, which was yet to be known. A key test to outlining such encryption plans to be reasonable in the proficient administration of encryption keys. The craved adaptability of imparting any gathering of chose reports to any gathering of clients requirement for something else encryption keys to be utilized for various records. Be that as it may, this likewise suggests the earnest need of safely circulating to clients a substantial number of keys for both encryption and seek, and those clients will need to shielded from risk store the got keys, and present a similarly expansive number of catchphrase trapdoors to the cloud keeping in mind the end goal to perform look over the mutual information inferred requirement for secure correspondence, stockpiling, and unpredictability unmistakably to provide for somebody the approach unreasonable. In this work an information proprietor just needs to convey a solitary key to a client for sharing an extensive number of archives, and the client just needs to present a solitary trapdoor to the cloud for questioning the mutual records
    corecore