A Secure and Scalable Data Sharing using Key Aggregate Crypto System
Bharati A. Patil1
- Dept. of Computer Engineering, SITRC (SPPU University), Nashik, India.
Correspondence should be addressed to: bharati.patil@sitrc.org .
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-10 , Page no. 342-346, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.342346
Online published on Oct 30, 2017
Copyright © Bharati A. Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Bharati A. Patil, “A Secure and Scalable Data Sharing using Key Aggregate Crypto System,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.342-346, 2017.
MLA Citation
MLA Style Citation: Bharati A. Patil "A Secure and Scalable Data Sharing using Key Aggregate Crypto System." International Journal of Computer Sciences and Engineering 5.10 (2017): 342-346.
APA Citation
APA Style Citation: Bharati A. Patil, (2017). A Secure and Scalable Data Sharing using Key Aggregate Crypto System. International Journal of Computer Sciences and Engineering, 5(10), 342-346.
BibTex Citation
BibTex Style Citation:
@article{Patil_2017,
author = {Bharati A. Patil},
title = {A Secure and Scalable Data Sharing using Key Aggregate Crypto System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {342-346},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1526},
doi = {https://doi.org/10.26438/ijcse/v5i10.342346}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.342346}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1526
TI - A Secure and Scalable Data Sharing using Key Aggregate Crypto System
T2 - International Journal of Computer Sciences and Engineering
AU - Bharati A. Patil
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 342-346
IS - 10
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
888 | 345 downloads | 340 downloads |




Abstract
Today, gaining popularity privacy for accessing outsourcing data stored on cloud is a major issue in cloud computing. In cloud storage data is stored on single physical machine and this stored data may shared by multiple users from different machines. User doesn`t have control on accessing outsourced data. For identification of leaked data to everyone data access security or privacy for data is a challenging section. To store as well for sharing data securely Cryptosystem is used. In cryptosystem before storing data on cloud user firstly encrypt data then placed it on cloud. And then data decryption is performed when user want to access it. This task may require multiple keys for data encryption as well as data decryption. In proposed system key-aggregation is implemented on concept on merging or aggregating the encryption and decryption key into single one in cryptosystem for sharing of scalable data. It is very compressed formed of aggregation of key. In proposed approach unique key can hold multiple keys that are required. In proposed system concentrate on sharing data securely, efficiently among multiple users. Sharing data and delegation of data is possible as fixed sized of data blocks are created. In this proposed system implements Shamir secret sharing algorithm for securely, sharing aggregate key for multiple users.
Key-Words / Index Term
Cloud storage, data sharing, key-aggregate encryption, patient-controlled encryption
References
[1] Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE transactions on parallel and distributed systems, 25(2), 468-477.
[2] M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hi-erarchies, ACM Transactions on Information and SystemSecurity (TISSEC), vol. 12, no. 3, 2009. 416432.
[3]J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient Controlled Encryption:, in Proceedings of ACM Work-shopCloud Computing. ACM, 2009, pp. 103114.
[4] F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedingsof Information Security and Cryptology (Inscrypt 07), ser.LNCS, vol. 4990.Springer, 2007, pp. 384398.
[5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of En-crypted data, in Proceedings of the 13th ACM conferenceon Computer security. ACM, 2006, pp. 8998.
[6] S. G. Akl and P. D. Taylor, Cryptographic Solution to aProblem of Access Control in a Hierarchy, ACM Trans-actions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239-248, 1983.