A Survey on Asymmetric Key Aggregate Encryption in Data Sharing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

A Survey on Asymmetric Key Aggregate Encryption in Data Sharing

Shilpashree P, Dr. K. N. Narasimha Murthy

Data sharing is the ability to share the same data resource with multiple applications or users. The data can be shared with others in a secure, efficient and economic way. Internet and cloud storages are rapidly growing day by day. So sharing of sensitive data through internet and cloud storage is an issue because there is a possibility of third party can steal the sensitive and confidential data. To overcome this problem data should be encrypted before sent across internet. Encryption is a technique of converting plaintext to ciphertext. Asymmetric is a kind of encryption which helps to share a data in a public key encryption, here the encryption key and decryption key are different. In this paper, the concept of aggregator key is introduced, which collects all the keys generated by the data owner and made it as a compact key. This compact key has consists of number of keys and using this aggregate key the data consumer can access only the data who is authenticate.

Keywords: Asymmetric, Cloud storage, Data Sharing, Encryption, Key Aggregate

Edition: Volume 4 Issue 3, March 2015

Pages: 1925 - 1928

Share this Article

How to Cite this Article?

Shilpashree P, Dr. K. N. Narasimha Murthy, "A Survey on Asymmetric Key Aggregate Encryption in Data Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152535, Volume 4 Issue 3, March 2015, 1925 - 1928

128 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Asymmetric'

| Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

| Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2810 - 2816

Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures

T. Balamurugan, T. Hemalatha

Share this Article

| Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1925 - 1928

A Survey on Asymmetric Key Aggregate Encryption in Data Sharing

Shilpashree P, Dr. K. N. Narasimha Murthy

Share this Article

| Weekly Popularity: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2606 - 2609

Designing and Comparative Analysis of Image Transmission using Techniques HQAM and QAM

Neeru Sharma

Share this Article

Similar Articles with Keyword 'Cloud storage'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

| Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

| Weekly Popularity: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

| Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

| Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Similar Articles with Keyword 'Data Sharing'

| Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

| Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

| Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'Encryption'

| Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

| Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

| Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'Key Aggregate'

| Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

| Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1925 - 1928

A Survey on Asymmetric Key Aggregate Encryption in Data Sharing

Shilpashree P, Dr. K. N. Narasimha Murthy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2375 - 2378

A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage

Rachana Gangwani, H. A. Hingoliwala

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1448 - 1452

Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

C. Suganya, A. Sangeetha

Share this Article
Top