International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 101

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne


Abstract: Data sharing is playing vital role in the cloud storage. Using cloud storage user can store and share their data very securely and efficiently. So data access security becomes the critical section to be focused. In this article, we describe a technique which works on how a user can share their data partially over cloud storages. This technique introduces a special type of encryption called as key-aggregate cryptosystem which produces constant size ciphertext. In this technique user can provide a constant-size aggregate key for different choices of ciphertext classes in cloud storage, but the other encrypted files outside the class remain confidential. We implemented this cryptosystem for public-key patient-controlled encryption for flexible hierarchy.


Keywords: Cloud Computing, Key-aggregate encryption, patient-controlled encryption, leakage resilient cryptosystem


Edition: Volume 3 Issue 11, November 2014,


Pages: 1232 - 1234


How to Cite this Article?

Rashmi Khawale, Omprakash Tembhurne, "A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT141191, Volume 3 Issue 11, November 2014, 1232 - 1234

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cloud Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'leakage'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3087 - 3089

Confidential and Efficient Hosting Query Services in Public Clouds with RASP Data Disruption

Vanajakshi Devi.K, Praveen Kumar.N

Share this Article

Similar Articles with Keyword 'resilient'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2120 - 2123

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, J. L. Chaudhari

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1837 - 1840

A Survey on Enabling Rich Mobile Multimedia Constructed By an Adaptive Mobile Cloud Computing

Mayur P. Band, N.D.Kale

Share this Article

Similar Articles with Keyword 'cryptosystem'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article
Top