Nagababu Morampudi, A. Sreenivas Rao


Data talking about is a vital functionality in cloud storage. Within the following sentences, we show the simplest approach to securely, efficiently, and flexibly share information with others in cloud storage. We describe new public-key cryptosystems which produce constant-size cipher texts to make certain that efficient delegation of understanding legal rights for virtually a number of cipher texts could be accomplished. The novelty is that you may aggregate a number of secret keys making them as compact like a single key, but encompassing pressure of all the keys being aggregated. Basically, the important thing factor holder can to create constant-size aggregate key for flexible choices of cipher text occur cloud storage, nevertheless another encoded files outdoors the set remain private. This compact aggregate key could be moved to other people or perhaps be kept in the wise card with limited secure storage. We provide formal security analysis within our schemes inside the standard model. We describe other use of our schemes. Particularly, our schemes provide you with the first public-key patient-controlled file encryption for flexible hierarchy, which was unfamiliar. Most likely probably the most well-loved flexibility of talking about numerous selected documents with numerous clients demands different file encryption keys to be used for many documents. However, this signifies involve securely disbursing to clients lots of keys for file encryption and check, and people clients will have to securely keep received keys, and submit a likewise many keyword trapdoors for your cloud to manage to perform search inside the shared data. The implied reliance on secure communication, storage, and complexity clearly renders the approach improper.


Key-Aggregate Searchable Encryption (KASE); Data Sharing; Cloud Storage;


F. Zhao, T. Nishide, K. Sakurai. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. Information Security and Cryptology, LNCS, pp. 406-418, 2012.

X. Song, D.Wagner, A. Perrig. “Practical techniques for searches on encrypted data”, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000.

J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014.

D. Boneh, B. Lynn, H. Shacham. “Short signatures from the Weil pairing”, Advances in Cryptology ASIACRYPT 2001, pp. 514-532, 2001.

M. Li, W. Lou, K. Ren. “Data security and privacy in wireless body area networks”, Wireless Communications, IEEE, 17(1): 51-58, 2010.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.