A Flexible Crypto Mechanism for Secure Sharing In Cloud Environment
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Majeti Abhinav; N. Bhagya Lakshmi;
Page : 272-277
Keywords : Cloud storage; data sharing; key-aggregate encryption; patient-controlled encryption;
- Effect of Islamic Banking Financing Strategies on Customer Satisfaction in Kenya
- The Linkages Effect of Service Quality, Customer Satisfaction and Customer Loyalty of Automobile Financing within the Malaysia Islamic Banking Industry
- Generic Strategies and Effect on Customer Satisfaction at Kenya Power in Nakuru County
- Effects of Customer Service Strategies on Customer Satisfaction of Firms in the Telecommunication Sector in Kenya
- Exploring Service Quality in Islamic Banking Industry of Afghanistan: An Analysis of Customer Satisfaction
Abstract
Cloud Computing is a big buzz word in todays technology uplift, storage of data in distributed network has been re-defined in the cloud environment and sharing the data stored is an important aspect of cloud storage systems which has raised many eyebrows with its security policies. In this paper, we present an flexible modelled crypto mechanism that produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher texts set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
Other Latest Articles
- An Assessment of the Effects of Recruitment Outsourcing On Performance of Flowers Firms in Nakuru County, Kenya
- A Study of Organizational Problems Faced by Pakistani Student Writers
- Brain Tumor Segmentation by FCM and Enhancement by ANN, using GLCM Based Feature Extraction
- Kinetics and Mechanism of the Selective Oxidation of Benzoic and Isonicotinic Acid Hydrazides to their Corresponding Acids by Thallium (III) in Aqueous 1, 4-Dioxane Medium
- Effect of Strategic Management Practices on Bank Loan Recovery by Commercial Banks in Kenya: A Case of Family Bank Limited
Last modified: 2021-06-30 21:12:54