Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

Size: px
Start display at page:

Download "Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems"

Transcription

1 Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems S.Palani 1 E.Sujith 2 Poun Kumar.V 3 Assistant Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri Venkateswara College of Engineering and Technology Chittoor Abstract: Information offering is an imperative usefulness in distributed storage. In this article, we demonstrate to safely, productively, and adaptably impart information to others in distributed storage. We depict new open key cryptosystems which deliver steady size cipher texts such that productive designation of unscrambling rights for any arrangement of cipher texts are conceivable. The oddity is that one can total any arrangement of mystery keys and make them as conservative as a solitary key, yet incorporating the force of every last one of keys being amassed. As such, the mystery key holder can discharge a steady size total key for adaptable decisions of cipher text set in distributed storage; however the other scrambled records outside the set stay private. This reduced total key can be helpfully sent to others or be put away in a shrewd card with extremely restricted secure stockpiling. We give formal security investigation of our plans in the standard model. We likewise depict other utilization of our plans. Specifically, our plans give the first open key patient-controlled encryption for adaptable progression, which was yet to be known. Index Terms:-Cloud storage, Key-aggregate cryptosystem (KAC), Ciphertext, Encryption, Decryption, secret key I. INTRODUCTION Distributed storage is a stockpiling of information online in cloud which is available from different and joined assets. Cloud capacity can give great openness and unwavering quality, solid assurance, debacle recuperation, and least cost. Distributed storage havingessential usefulness i.e. safely, productively, adaptably imparting information to others. New open key encryption which is called as Key-total cryptosystem (KTC) is presented. Key-total cryptosystem produce steady size ciphertexts such that effective assignments of decoding rights for any arrangement of cipher text are conceivable. Any arrangement of mystery keys can be accumulated and make the m as single key, which includes force of every last one of keys being accumulated. This total key can be sent to the others for decoding ofciphertext set and staying scrambled records outside the set are stays classified Cloud Storage is these days exceptionally famous capacity framework. Distributed storage is putting away of information off - site to the physical stockpiling which is kept up by outsider. Distributed storage is sparing of computerized information in coherent pool and physical stockpiling compasses numerous servers which are oversee by outsider. Outsider is in charge of keeping information accessible and open and ISSN: Page 140

2 physical environment ought to be ensured and running at untouched. As opposed to putting away information to the hard commute or whatever other neighborhood stockpiling, we spare information to remote stockpiling which is available from anyplace and at whatever time. It lessens endeavors of conveying physical stockpiling to all over. By utilizing cloud capacity we can get to data from any PC through web which precluded confinement of getting to data from same PC where it is put away. While considering information security, we can't depend on customary procedure of confirmation, in light of the fact that sudden benefit acceleration will uncover all information. Arrangement is to encode information before transferring to the server with client's own particular key. Information imparting is again imperative usefulness of distributed storage, in light of the fact that client can impart information from anyplace and at whatever time to anybody. For instance, association y stipend authorization to get to a piece of delicate information to their workers. Anyway difficult undertaking is that how to impart scrambled information. Customary way is client can download the encoded information from capacity, decode that information and send it to impart to others, however it loses the significance of distributed storage. Cryptography system can be connected in a two noteworthy ways one is symmetric key encryption and other is deviated key encryption. In symmetric key encryption, same keys are utilized for encryption and decoding. By complexity, in halter kilter key encryption distinctive keys are utilized, open key for encryption and private key for decoding. Utilizing awry key encryption is more adaptable for our methodology. This can be outlined by taking after case. Assume Alice put all information on Box.com and she would like to open her information to everybody. Because of information spillage conceivable outcomes she does not trust on protection component gave by Box.com, so she scrambles all information before transferring to the server. On the off chance that Bob ask her to impart some information then Alice utilization offer capacity of Box.com. Be that as it may issue now is that how to offer encoded information. There are two extreme ways: 1. Alice encode information with single mystery key and offer that mystery key specifically with the Bob. 2. Alice can scramble information with unmistakable keys and send Bob comparing keys to Bob through secure channel. In first approach, undesirable information likewise get open to the Bob, which is insufficient. In second approach, no. of keys is the same number of as no. of imparted records, which may be hundred or thousand and also exchanging these keys oblige secure channel and storage room which can be extravagant. Subsequently best answer for above issue is Alice scrambles information with particular open keys, yet send single unscrambling key of steady size to Bob. Since the decoding key ought to be sent through secure channel and kept mystery little size is aalways lucky. To plan an effective open key encryption plan which underpins adaptable appointment as in any ISSN: Page 141

3 subset of the ciphertexts(produced by the encryption scheme) is decrypt able by a constant-size decryption key (generated by the owner of the master-secret key). II. RELATED STUDY Encryption key strategy An encryption plan which is initially proposed for briefly transmitting huge number of keys in telecast situation. The development is basic and we quickly survey its key inference handle here for a cement depiction of what are the alluring properties we need to attain to. The deduction of the key for an arrangement of classes (which is a subset of all conceivable ciphertext classes) is as takes after. A composite modulus is picked where p and q are two vast irregular primes. An expert mystery key is picked at arbitrary. Every class is connected with a particular prime. All these prime numbers can be placed in the general population framework parameter. A consistent size key for set can be produced. For the individuals who have been assigned the entrance rights for Sˈ can be created. In any case, it is planned for the symmetric-key setting. The content supplier needs to get the relating mystery keys to encode information, which is not suitable for some applications. Since strategy is utilized to produce mystery esteem as opposed to a couple of open/mystery keys, it is vague how to apply this thought for open key encryption plan. At long last, we take note of that there are plans which attempt to lessen the key size for accomplishing confirmation in symmetric-key encryption, On the other hand, offering of decoding force is not a worry in these plans. IBE with compact key Identity based encryption (IBE) is an open key encryption in which the general population key of a client can be set as an personality string of the client (e.g., an address, portable number). There is a private key generator (PKG) in IBE which holds a expert mystery key and issues a mystery key to every client with deference to the client personality. The content supplier can take general society parameter and a client personality to scramble a message. The beneficiary can decode this ciphertext by his mystery key. To manufacture IBE with key conglomeration. In their plans, key accumulation is obliged as in all keys to be accumulated must originated from diverse identity divisions. While there are an exponential number of characters and subsequently mystery keys, just a polynomial number of them can be aggregatedthis altogether builds the expenses of putting away and transmitting ciphertexts, which is illogical by and large, for example, imparted distributed storage. As another approach to do this is to apply hash capacity to the string indicating the class, and continue hashing over and again until a prime is acquired as the yield of the hash functionwe specified, our plans highlight steady ciphertext size, and their security holds in the standard model. In fluffy IBE one single minimized mystery key can decode ciphertexts encoded under numerous personalities which are shut in a certain metric space, however not for a discretionary arrangement of characters furthermore, subsequently it doesn't coordinate with our concept of key to key. ISSN: Page 142

4 Different Schemes Cipher Texts Size Decryption Key Size Encryption Type Key Assignment Schemes Constant Non-Constant Symmetric or Public Key Symmetric-Key encryption Constant Constant Symmetric Key with Compact Key IBE with Compact Key Non-Constant Constant Public Key Attribute Based Constant Non-Constant Public Key Encryption KAC Constant Constant Public Key Table.1 Comparison between KAC scheme and other related scheme III. ROBUST KEY AGGREGATE CRYPTOSYSTEMS In Robust key-aggregate cryptosystem (RKAC), clients scramble a message under an open key, as well as under an identifier of ciphertext called class. That implies the ciphertexts will be further classified into distinctive classes. The key holder holds an expert mystery called expert mystery key, which can be utilized to concentrate mystery keys for distinctive classes. More essentially, the extricated key have can be a total key which is as minimal as a mystery key for a solitary class; however totals the force of numerous such keys, i.e., the decoding force for any subset of cipher text classes. With our illustration, Alice can send Bob a solitary total key through a safe . Sway can download the scrambled photographs from Alice's Box.com space and afterward utilize this total key to unscramble these encoded information. The sizes of ciphertext, open key, expert mystery key Also, total key in RKAC plans are all of consistent size. General society framework parameter has size direct in the quantity of ciphertext classes, at the same time just a little piece of it is required every time and it can be brought on interest from substantial (non -private) distributed storage. The information that is transmitted through the total box will be encrypted. IV. SCHEME OF ROBUST KEY AGGREGATE CRYPTO SYSTEMS (KRAC) The information manager makes general society framework parameter through Setup and produces an open/expert mystery key match through KeyGen. Information can be encoded by means of Encrypt by any individual who additionally chooses what ciphertext class is connected with the plaintext message to be encoded. ISSN: Page 143

5 Schematic Rules for Robust Key Aggregate Cryptosystems 1. Setup (1 λ,n) : The Information owner establishes a parameter for public systems via Setup. On input of a security level parameter 1 λ and number of cipher text classes n, it outputs the public system parameter param 2. KeyGen: It is executed by information owner to randomly generate a public/m Secret key (P k,msk) 3. Encyprt (P k,i,m): It is executed by data owner and for message m and index i, it computes the ciphertext as C 4. Extract(msk,S): It is executed by information owner for attending the decrypting power for a particular set of cipher text classes and it outputs the aggregate key for set S denoted by Ks 5. Decrypt (Ks,S,I,C): It is executed by a delegate who received, an random key Ks, created by extract. On input Ks, set S, an index I denoting the ciphertext class ciphertext to and output is decrypted result m. The information manager can utilize the expert mystery key pair to create a total unscrambling key for an arrangement of ciphertext classes through Extract. The produced keys can be gone to delegates safely through secure messages or secure gadgets finally, any client with a total key can unscramble any ciphertext gave that the ciphertext's class is contained in the total key by means of Unscramble. Key total encryption plans comprise of five polynomial time calculations as takes after An authoritative utilization of KAC is information offering. The key total property is particularly helpful when we anticipate that assignment will be proficient and adaptable. the KAC plans empower a substance supplier to impart her information in a secret and particular path, with an altered also, little ciphertext development, by appropriating to every approved client a solitary and little total key. Information partaking in distributed storage utilizing KAC, showed in Figure 1. Assume Alice needs to impart her information m1, m2,...,mn on the server.she first performs Setup (1λ, n) to get param and execute KeyGen to get people in general/expert mystery key pair (pk, msk). The framework parameter param and open key pk can be made open and expert mystery key msk ought to be kept mystery by Alice. Anybody can then encode every mi by Ci = Encrypt (pk, i, mi). The encoded ISSN: Page 144

6 information are transferred to the server. With param and pk, individuals who participate with Alice can upgrade Alice's information on the server. When Alice is willing to impart a set S of her information with a companion Bob, she can process the total key KS for Bob by performing Extract (msk, S). Since KS is simply a consistent size key, it is anything but difficult to be sent to Bob through a protected . In the wake of getting the total key, Bob can download the information he is approved to get to. That is, for every i ϵ S, Bob downloads Ci from the server. With the total key KS, Bob can decode every Ci by Decrypt (KS, S, i, Ci) for every example. simply get a total key of steady size. In distributed storage, the quantity of figure messages for the most part becomes quickly with no limitations. So we have to save enough figure content classes for the future augmentation. Else, we have to grow general society key. Despite the fact that the parameter can be downloaded with figure writings, it would be better in the event that its size is free of the greatest number of figure content classes. VI. REFERENCES [1] Cheng-Kang Chu,Chow, S.S.M, Wen-GueyTzeng, Jianying Zhou, and Robert H. Deng, Key-Aggregate Cryptosystem forscalable Data Sharing in Cloud Storage, IEEE Transactions on Parallel and Distributed Systems. Volume: 2 5, Issue: 2. Year :2014. [2] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records, in Proceedings of ACM Workshop on Cloud Computing Security (CCSW 09). ACM, 2009, pp [3] J. Benaloh, Key Compression and Its Application to Digital Fingerprinting, Microsoft Research, Tech. Rep., [4] B. Alomair and R. Poovendran, Information Theoretically Secure Encryption with Almost Free Authentication, J. UCS, vol. 15, no. 15, pp , [5] D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, in Proceedings of Advances in Cryptology CRYPTO 01, ser. LNCS, vol Springer, 2001, pp V.CONCLUSION Clients information protection is a focal inquiry of distributed storage. Pack mystery enters in broad daylight key cryptosystems which bolster assignment of mystery keys for distinctive figure content classes in cloud capacity. Regardless of which one among the force set of classes, the delegatee can [6] A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Proceedings of Advances in Cryptology - EUROCRYPT 05, ser. LNCS, vol Springer, 2005, pp [7] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions, in ACM Conference on Computer and Communications Security, 2010, pp ISSN: Page 145

7 [8] F. Guo, Y. Mu, and Z. Chen, Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key, in Proceedings of Pairing-Based Cryptography (Pairing 07), ser. LNCS, vol Springer, 2007, pp [9] F. Guo, Y. Mu, Z. Chen, and L. Xu, Multi-Identity Single-Key Decryption without Random Oracles, in Proceedings of Information Security and Cryptology (Inscrypt 07), ser. LNCS, vol Springer, 2007, pp [10] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions, in ACM Conference on Computer and Communications Security, 2010, pp E.Sujith is currently MCA Scholar from SVCET, Chittoor. He is graduated in BCA from Bangalore University in 2011, His area of Interest is DBMS and Java Poun Kumar V is currently MCA Scholar from SVCET, Chittoor. He is graduated in B.Sc. (Stats) from SV University; Tirupati in 2011, His area of Interest is DBMS and Java [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 06). ACM, 2006, pp [12] M. Chase and S. S. M. Chow, Improving Privacy and Security in Multi-Authority Attribute-Based Encryption, in ACM Conference on Computer and Communications Security, 2009, pp [13] T. Okamoto and K. Takashima, Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption, in Cryptology and Network Security (CANS 11), 2011, pp [14] S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M.Yiu, "SPICE -Simple Privacy-Preserving Identity-Management for Cloud Environment," in Applied Cryptography and Network Security - ACNS2012, ser. LNCS, vol Springer, 2012, pp [15] L. Hardesty, "Secure computers aren t so secure," MIT press, 2009, AUTHOR PROFILE S. Palani is currently working as the Assistant Professor in SVCET, Chittoor. He has 2 Years of Experience in Teaching. His area of Interest is Human Computer Interaction and AI ISSN: Page 146

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Implementation of Data Sharing in Cloud Storage Using Data Deduplication Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

Cloud Based Enterprise Resource Planning Using Software As A Service

Cloud Based Enterprise Resource Planning Using Software As A Service Cloud Based Enterprise Resource Planning Using Software As A Service Sujatha A1, Jayasudha R2, Prof Srinivasan. R3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1

More information

A Novel Type Of Public Key Encryption In Cloud Data Sharing

A Novel Type Of Public Key Encryption In Cloud Data Sharing A Novel Type Of Public Key Encryption In Cloud Data Sharing K.AGALYA [1],P.UPPILIRAJA [2] Prist University,Kumbakonam Abstract Cloud storage is gaining popularity recently. In enterprise settings, we see

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Security Saving Open Examining for Secure Cloud storage

Security Saving Open Examining for Secure Cloud storage ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure

More information

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Singapore Management University Institutional Knowledge at Singapore Management University Research Collection School Of Information Systems School of Information Systems 2014 Key-Aggregate Cryptosystem

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access

More information

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data V.Abinaya PG Scholar Kalasalingam Institute of Technology Krishnankoil. V.Ramesh Assistant professor Kalasalingam

More information

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Categorical Heuristic for Attribute Based Encryption in the Cloud Server Categorical Heuristic for Attribute Based Encryption in the Cloud Server R. Brindha 1, R. Rajagopal 2 1( M.E, Dept of CSE, Vivekanandha Institutes of Engineering and Technology for Women, Tiruchengode,

More information

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

Multi Layered Securing of Health Records using Public and Private Model in Cloud

Multi Layered Securing of Health Records using Public and Private Model in Cloud pp 97 102 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Multi Layered Securing of Health Records using Public and Private Model in Cloud Vijay J 1, Anitha C.L 2 1 P.G.Student,

More information

Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method

Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method A.Manikanta Sharma M.Tech Student Sri Vatsavai Krishnam Raju College of Engineering and Technology, Bhimavaram, AP. Abstract:

More information

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption Bonfring International Journal of Research in Communication Engineering, Vol. 2, No. 3, September 2012 1 An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment

More information

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica

More information

Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption

Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption ISSN (Online): 2349-7084 Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption Meghana A 1, Gaddam Gowthami 2, Mahendrakar Kavitha Bai 3, M.Srilakshmi 4 Department

More information

Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network

Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network Korra Bichya Abstract-Portable nodes in military environments, for example, a front line or an antagonistic area

More information

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

DESIGN OF A SECURE CRYPTO- MECHANISM FOR DATA STORING AND SHARING IN CLOUD ENVIRONMENT

DESIGN OF A SECURE CRYPTO- MECHANISM FOR DATA STORING AND SHARING IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DESIGN OF A SECURE CRYPTO- MECHANISM FOR DATA STORING AND SHARING IN CLOUD ENVIRONMENT 1 Seema Tahalyani, 2 Dr.S.M.Ghosh

More information

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Experiments in Encrypted and Searchable Network Audit Logs

Experiments in Encrypted and Searchable Network Audit Logs Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: bhanprak@cisco.com Sashank Dara Cisco Systems

More information

Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana

Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana Abstract In this project we intervened certificateless encryption plan without matching operations for

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

Advanced Library Management System Using Bluetooth in Android Platform

Advanced Library Management System Using Bluetooth in Android Platform Advanced Library Management System Using Bluetooth in Android Platform A.M.Rangarajan 1 S.Gavaskar 2 P. Purusotham Naidu 3 Associate Professor MCA Scholar MCA Scholar Department of Master of Computer Applications

More information

Lecture 17: Re-encryption

Lecture 17: Re-encryption 600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy

More information

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Shivarathri Ravinder M. Tech Student, Dept. of CSE, CMR College of Engineering and Technology, Kandlakoya Village, Medchal

More information

Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method

Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method Tzeng, Jengnan National Chengchi University, Taipei, Taiwan Tsai, Jer-Min Kun Shan University, Yung-Kang, Taiwan Chen, I-Te

More information

Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105

More information

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Journal homepage: www.mjret.in A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Suryakant Kadam, Prof. Pankaj Agarkar Department of Computer Engineering, Savitribai Phule Pune University

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

Semi-Trusted Authentication for Health Data in Cloud

Semi-Trusted Authentication for Health Data in Cloud JOURNAL OF COMPUTER SCIENCE AND ENGINEERING Semi-Trusted Authentication for Health Data in Cloud Rajeswari.M 1, Anjelin Lilly Jasmine.P 2, V.Komaladevi 3, K.Monika 4 1 Assistant professor, 2,3,4 Students,

More information

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Efficient Unlinkable Secret Handshakes for Anonymous Communications 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Attributed-based Access Control for Multi-Authority Systems in Cloud Storage

Attributed-based Access Control for Multi-Authority Systems in Cloud Storage 2012 32nd IEEE International Conference on Distributed Computing Systems Attributed-based Access Control for Multi-Authority Systems in Cloud Storage Kan Yang Department of Computer Science City University

More information

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people

More information

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes

Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes Batch Decryption of ncrypted Short Messages and Its Application on Concurrent SSL Handshakes Yongdong Wu and Feng Bao System and Security Department Institute for Infocomm Research 21, Heng Mui Keng Terrace,

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD

PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD http:// PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD Mrs. Ramya.R 1, Mrs. Shruthi.G 2 1 M. Tech. Student, 2 Assistant Professor, Department of CSE, Don Bosco Institute of Technology, Bangalore,

More information

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,

More information

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering

More information

Certificate Based Signature Schemes without Pairings or Random Oracles

Certificate Based Signature Schemes without Pairings or Random Oracles Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying

More information

Data defense in unpredictable Cloud Using Access Control and Access Time

Data defense in unpredictable Cloud Using Access Control and Access Time International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 12 December. 2013 PP.29-34 Data defense in unpredictable Cloud Using Access Control

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

Scalable and secure sharing of data in cloud computing using attribute based encryption

Scalable and secure sharing of data in cloud computing using attribute based encryption Volume :2, Issue :4, 416-420 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Ghodake Shubhangi Joshi Priyanka Khobragade Pranjali Chandak Manjiri Scalable

More information

3-6 Toward Realizing Privacy-Preserving IP-Traceback

3-6 Toward Realizing Privacy-Preserving IP-Traceback 3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

New Efficient Searchable Encryption Schemes from Bilinear Pairings

New Efficient Searchable Encryption Schemes from Bilinear Pairings International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

CP-ABE Based Encryption for Secured Cloud Storage Access

CP-ABE Based Encryption for Secured Cloud Storage Access International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September-2012 1 CP-ABE Based Encryption for Secured Cloud Storage Access B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy,

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems

DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang Dept. of CS, City University of Hong Kong Dept. of CSE, University at Buffalo,

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE Revathy B.D #1, Tejaswini.B #2, Abstract By means of the new arrival of cloud computing, data proprietors are provoked

More information

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud 1 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Kan Yang Associate Member IEEE Xiaohua Jia Fellow IEEE Kui Ren Senior Member IEEE Abstract Due to the high volume

More information

Monitoring Data Integrity while using TPA in Cloud Environment

Monitoring Data Integrity while using TPA in Cloud Environment Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Melissa Chase (MSR) Joint work with Josh Benaloh, Kristin Lauter, and Eric Horvitz Medical Records Traditionally, health providers

More information

Identity-Based Encryption from the Weil Pairing

Identity-Based Encryption from the Weil Pairing Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages

More information

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.

More information

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com Identity Based Encryption Terence Spies VP Engineering terence@voltage.com Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and

More information

Title Security Related Issues for Cloud Computing

Title Security Related Issues for Cloud Computing Title Security Related Issues for Cloud Computing Ashwini Singh Abstract: The term CLOUD implies Common Location Independent Online Utility on Demand. It's a rising innovation in IT commercial ventures.

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

A Fully Homomorphic Encryption Implementation on Cloud Computing

A Fully Homomorphic Encryption Implementation on Cloud Computing International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic

More information

Decentralized Access Control Schemes for Data Storage on Cloud

Decentralized Access Control Schemes for Data Storage on Cloud Computer Science and Engineering 2016, 6(1): 1-6 DOI: 10.5923/j.computer.20160601.01 Decentralized Access Control Schemes for Data Storage on Cloud Shraddha V. Mokle *, Nuzhat F. Shaikh Department of Computer

More information

How To Ensure Data Integrity In Clouds

How To Ensure Data Integrity In Clouds Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption Abstract: Charan 1, K Dinesh Kumar 2, D Arun Kumar Reddy 3 1 P.G Scholar, 2 Assistant Professor, 3 Associate Professor 1,2,3

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Secret Sharing based on XOR for Efficient Data Recovery in Cloud Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, kimsh@sch.ac.kr

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Public Cloud Storage Using Privacy-Preserving

Public Cloud Storage Using Privacy-Preserving International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 11-17 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Public Cloud Storage Using Privacy-Preserving

More information

Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control

Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control Shintomon Mathew 1, George T. Vadakkumcheril 2, T. Justin Jose 3 1 Final Year M.Tech Cyber Security,KMP

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Lecture 25: Pairing-Based Cryptography

Lecture 25: Pairing-Based Cryptography 6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography

More information

Security System in Cloud Computing for Medical Data Usage

Security System in Cloud Computing for Medical Data Usage , pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School

More information

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,

More information

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Keyword Search over Shared Cloud Data without Secure Channel or Authority Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information