Downloads: 122 | Views: 305
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 7 Issue 12, December 2018 | Popularity: 6.3 / 10
Key Aggregate Cryptosystem for Secure Group Data Sharing on Cloud
Smital Erande
Abstract: Search over scrambled information is a basically critical empowering system in distributed computing, where encryption-before outsourcing is a principal answer for securing client information protection in the untrusted cloud server environment. Many secure hunt plans have been concentrating on the single-donor situation, where the outsourced dataset or the protected searchable file of the dataset are encoded and overseen by a solitary proprietor, regularly in view of symmetric cryptography. In this paper, we concentrate on an alternate yet additionally difficult situation where the outsourced dataset can be contributed from different proprietors and are searchable by numerous clients, i. e. multi-client multi-supporter case. Propelled by trait based encryption (ABE), we show the main characteristic based watchword look conspire with proficient client disavowal (ABKS-UR) that empowers versatile fine-grained (i. e. document level) look approval. Our plan permits different proprietors to encode and outsource their information to the cloud server freely. Clients can create their own particular pursuit abilities without depending on a constantly online trusted power. Fine-grained seek approval is additionally actualized by the proprietor implemented get to strategy on the list of every record. Promote, by fusing intermediary re-encryption and lethargic re-encryption procedures, we can appoint overwhelming framework redesign workload amid client disavowal to the creative semi-trusted cloud server. We formalize the security definition and demonstrate the proposed ABKS-UR plot specifically secure against picked catchphrase assault. To assemble certainty of information client in the proposed secure inquiry framework, we additionally outline a query item check conspire. At long last, execution assessment demonstrates that the productivity of our plan. In ABKS-UR, the get to approach is connected to the figure message in plaintext shape, which may likewise release some private data about end-clients. Existing techniques just halfway shroud the characteristic values in the get to approaches, while the trait names are still unprotected, these issues are change in our plan to give more security. While transferring a record time server is connected with document to give access to record to restricted time simply after that time document is inaccessible for shoppers additionally property blossom channel create characteristics of record while transferring and this traits are store with document. Quality power in our plan relegate open key to client while transferring documents on cloud furthermore records mystery key and private key to information customer while transferring. Subsequent to entering watchword client buyer will get best rank outcome relies on characteristic and time and can download that document if customer having key of that record and can decode record.
Keywords: Searchable encryption, data sharing, cloud storage, data privacy
Edition: Volume 7 Issue 12, December 2018
Pages: 1187 - 1191
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar, Dr. Margi Patel
Downloads: 99
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Downloads: 99
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy