International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 108

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K [6] | Manjula R [2]


Abstract: Cryptography in the field of information technology is an art to protect data privacy using standard mathematical techniques. Cloud computing, one of the emerging techniques to lease computing resources on demand, makes use of remote data storage where data owner does not possess direct control over her data. To protect privacy of users data and to enable user to verify integrity of the data stored on remote location, modern cryptographic techniques are used. So, if users paying awareness in selection of proper cryptographic scheme then it can achieve confidentiality without losing performance of Cloud. For Achieving high performance and security users can select any of modern encryption techniques. Here considering time and key difference to compare which algorithm is best in security and speed over the data. Data sharing being important functionality in cloud storage implements how to securely, efficiently, and flexibly share data with others. The public-key cryptosystems produce constant-size cipher texts that efficiently delegate the decryption rights for any set of cipher texts. The importance is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. The secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. The aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage.


Keywords: outsourced data, share data, authentication, Cryptography, data owner, encrypts data and Key aggregate cryptosystem KAC


Edition: Volume 5 Issue 5, May 2016,


Pages: 1087 - 1091


How to Cite this Article?

Kavitha K, Manjula R, "Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 1087-1091, https://www.ijsr.net/get_abstract.php?paper_id=NOV163525

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'outsourced data'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode | Hemlata Channe

Share this Article


Top