Open Access   Article Go Back

An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing

Paramasivam 1 , L.Jayasimman 2 , R.Saradha 3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 380-384, Mar-2018

Online published on Mar 31, 2018

Copyright © Paramasivam, L.Jayasimman, R.Saradha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Paramasivam, L.Jayasimman, R.Saradha, “An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.380-384, 2018.

MLA Style Citation: Paramasivam, L.Jayasimman, R.Saradha "An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing." International Journal of Computer Sciences and Engineering 06.02 (2018): 380-384.

APA Style Citation: Paramasivam, L.Jayasimman, R.Saradha, (2018). An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing. International Journal of Computer Sciences and Engineering, 06(02), 380-384.

BibTex Style Citation:
@article{_2018,
author = {Paramasivam, L.Jayasimman, R.Saradha},
title = {An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {380-384},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=270},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=270
TI - An Efficient Cloud Storage Based On Key Aggregate Searchable Encryption for Group Data Sharing
T2 - International Journal of Computer Sciences and Engineering
AU - Paramasivam, L.Jayasimman, R.Saradha
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 380-384
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Broadcasting the encrypted data via cloud storage may greatly ease security concerns.. Security is provided to access data in wireless broadcast services. Symmetric-key-based encryption is used to ensure the authorized users who own the valid keys can decrypt the data. With regard to various subscription activities, an efficient key management for distributing and changing keys is in great demand for the access control in broadcast services. Hence the proposed system namely, key tree reuse (KTR) to handle key distribution with regard to complex subscription options and user activities. It contributes all subscription activities in wireless broadcast services. Instead of separate sets of keys for each program, a user only needs to hold one set of keys for all subscribed programs. KTR identifies the minimum set of keys that must be altered to ensure broadcast security and minimize the rekey cost.

Key-Words / Index Term

Searchable encryption, data sharing, data privacy

References

[1] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010.
[2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing”, Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
[3] X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure multiowner data sharing for dynamic groups in the cloud”, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182- 1191.
[4] C. Chu, S. Chow,W. Tzeng, et al. “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468-477.
[5] X. Song, D.Wagner, A. Perrig. “Practical techniques for searches on encrypted data”, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000.
[6] R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. “Searchable symmetric encryption: improved definitions and efficient constructions”, In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79-88, 2006.
[7] P. Van,S. Sedghi, JM. Doumen. “Computationally efficient searchable symmetric encryption”, Secure Data Management, pp. 87-100, 2010.
[8] S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric encryption”, Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965- 976, 2012.
[9] D. Boneh, C. G, R. Ostrovsky, G. Persiano. “Public Key Encryption with Keyword Search”, EUROCRYPT 2004, pp. 506C522, 2004.
[10] Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System”, In: Pairing-Based Cryptography C Pairing 2007, LNCS, pp. 2-22, 2007.