Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-22 Number-3
Year of Publication : 2015
Authors : S.Palani, E.Sujith, Poun Kumar.V
  10.14445/22312803/IJCTT-V22P128

MLA

S.Palani, E.Sujith, Poun Kumar.V "Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems". International Journal of Computer Trends and Technology (IJCTT) V22(3):140-146, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Information offering is an imperative usefulness in distributed storage. In this article, we demonstrate to safely, productively, and adaptably impart information to others in distributed storage. We depict new open key cryptosystems which deliver steady size cipher texts such that productive designation of unscrambling rights for any arrangement of cipher texts are conceivable. The oddity is that one can total any arrangement of mystery keys and make them as conservative as a solitary key, yet incorporating the force of every last one of keys being amassed. As such, the mystery key holder can discharge a steady size total key for adaptable decisions of cipher text set in distributed storage; however the other scrambled records outside the set stay private. This reduced total key can be helpfully sent to others or be put away in a shrewd card with extremely restricted secure stockpiling. We give formal security investigation of our plans in the standard model. We likewise depict other utilization of our plans. Specifically, our plans give the first open key patient-controlled encryption for adaptable progression, which was yet to be known.

References
[1] Cheng-Kang Chu ,Chow, S.S.M, Wen-GueyTzeng, Jianying Zhou, and Robert H. Deng , ― Key-Aggregate Cryptosystem forScalable Data Sharing in Cloud Storage‖ , IEEE Transactions on Parallel and Distributed Systems. Volume: 2 5, Issue: 2. Year :2014.
[2] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, ―Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,‖ in Proceedings of ACM Workshop on Cloud Computing Security (CCSW ’09). ACM, 2009, pp. 103–114
[3] J. Benaloh, ―Key Compression and Its Application to Digital Fingerprinting,‖ Microsoft Research, Tech. Rep., 2009.
[4] B. Alomair and R. Poovendran, ―Information Theoretically Secure Encryption with Almost Free Authentication,‖ J. UCS, vol. 15, no. 15, pp. 2937–2956, 2009.
[5] D. Boneh and M. K. Franklin, ―Identity-Based Encryption from the Weil Pairing,‖ in Proceedings of Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229.
[6] A. Sahai and B. Waters, ―Fuzzy Identity-Based Encryption,‖ in Proceedings of Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457–473.
[7] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, ―Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,‖ in ACM Conference on Computer and Communications Security, 2010, pp. 152–161.
[8] F. Guo, Y. Mu, and Z. Chen, ―Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key,‖ in Proceedings of Pairing-Based Cryptography (Pairing ’07), ser. LNCS, vol. 4575. Springer, 2007, pp. 392–406.
[9] F. Guo, Y. Mu, Z. Chen, and L. Xu, ―Multi-Identity Single-Key Decryption without Random Oracles,‖ in Proceedings of Information Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398.
[10] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, ―Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,‖ in ACM Conference on Computer and Communications Security, 2010, pp. 152–161.
[11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,‖ in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89 –98.
[12] M. Chase and S. S. M. Chow, ―Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,‖ in ACM Conference on Computer and Communications Security, 2009, pp. 121–130.
[13] T. Okamoto and K. Takashima, ―Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption,‖ in Cryptology and Network Security (CANS ’11), 2011, pp. 138–159.
[14] S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M.Yiu, "SPICE -Simple Privacy-Preserving Identity-Management for Cloud Environment," in Applied Cryptography and Network Security - ACNS2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526543.
[15] L. Hardesty, "Secure computers aren’t so secure," MIT press, 2009, http://www.physorg.com/news1761073.

Keywords
Cloud storage, Key-aggregate cryptosystem (KAC), Ciphertext, Encryption, Decryption, secret key.