SlideShare a Scribd company logo
Key-Aggregate Cryptosystem for Scalable Data Sharing in 
Cloud Storage 
ABSTRACT: 
Data sharing is an important functionality in cloud storage. In this paper, we show 
how to securely, efficiently, and flexibly share data with others in cloud storage. 
We describe new public-key cryptosystems that produce constant-size ciphertexts 
such that efficient delegation of decryption rights for any set of ciphertexts are 
possible. The novelty is that one can aggregate any set of secret keys and make 
them as compact as a single key, but encompassing the power of all the keys being 
aggregated. In other words, the secret key holder can release a constant-size 
aggregate key for flexible choices of ciphertext set in cloud storage, but the other 
encrypted files outside the set remain confidential. This compact aggregate key can 
be conveniently sent to others or be stored in a smart card with very limited secure 
storage. We provide formal security analysis of our schemes in the standard model. 
We also describe other application of our schemes. In particular, our schemes give 
the first public-key patient-controlled encryption for flexible hierarchy, which was 
yet to be known.
EXISTING SYSTEM: 
Considering data privacy, a traditional way to ensure it is to rely on the server to 
enforce the access control after authentication, which means any unexpected 
privilege escalation will expose all data. In a shared-tenancy cloud computing 
environment, things become even worse. 
Regarding availability of files, there are a series of cryptographic schemes which 
go as far as allowing a third-party auditor to check the availability of files on 
behalf of the data owner without leaking anything about the data, or without 
compromising the data owners anonymity. Likewise, cloud users probably will not 
hold the strong belief that the cloud server is doing a good job in terms of 
confidentiality. 
A cryptographic solution, with proven security relied on number-theoretic 
assumptions is more desirable, whenever the user is not perfectly happy with 
trusting the security of the VM or the honesty of the technical staff. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. The costs and complexities involved generally increase with the number of the 
decryption keys to be shared. 
2. The encryption key and decryption key are different in publickey encryption.
PROPOSED SYSTEM: 
In this paper, we study how to make a decryption key more powerful in the sense 
that it allows decryption of multiple ciphertexts, without increasing its size. 
Specifically, our problem statement is “To design an efficient public-key 
encryption scheme which supports flexible delegation in the sense that any subset 
of the ciphertexts (produced by the encryption scheme) is decry ptable by a 
constant-size decryption key (generated by the owner of the master-secret key).” 
We solve this problem by introducing a special type of public-key encryption 
which we call key-aggregate cryptosystem (KAC). In KAC, users encrypt a 
message not only under a public-key, but also under an identifier of ciphertext 
called class. That means the ciphertexts are further categorized into different 
classes. The key owner holds a master-secret called master-secret key, which can 
be used to extract secret keys for different classes. More importantly, the extracted 
key have can be an aggregate key which is as compact as a secret key for a single 
class, but aggregates the power of many such keys, i.e., the decryption power for 
any subset of ciphertext classes.
ADVANTAGES OF PROPOSED SYSTEM: 
1. The extracted key have can be an aggregate key which is as compact as a 
secret key for a single class. 
2. The delegation of decryption can be efficiently implemented with the 
aggregate key. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and 
Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in 
Cloud Storage” IEEE TRANSACTIONS ON PARALLEL AND 
DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.

More Related Content

DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
key-aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
key-aggregate cryptosystem for scalable data sharing in cloud storage
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...

What's hot (19)

DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
A Review Paper on Secure authentication and data sharing in cloud storage usi...
PPT
Chapter 08
PPTX
Secure deduplicaton with efficient and reliable convergent
DOC
IEEE paper 2014 abstract
PDF
How encryption works
PDF
A hybrid cloud approach for secure authorized deduplication
PPT
PPT
fucking shit
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
DOCX
a hybrid cloud approach for secure authorized reduplications
PDF
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate cryptosystem for scalable data sharing in cloud storage
A Review Paper on Secure authentication and data sharing in cloud storage usi...
Chapter 08
Secure deduplicaton with efficient and reliable convergent
IEEE paper 2014 abstract
How encryption works
A hybrid cloud approach for secure authorized deduplication
fucking shit
Secure Authorised De-duplication using Convergent Encryption Technique
a hybrid cloud approach for secure authorized reduplications
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Essential Guide to Protect Your Data [Key Management Techniques]
Ad

Similar to JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage (20)

PPTX
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
PDF
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
PDF
F018133640.key aggregate paper
PDF
ijircee_Template
PDF
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
PDF
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
PDF
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PDF
Anonymous Key Based Secure File Encryption in Cloud
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
PDF
IJSRED-V2I3P52
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
F018133640.key aggregate paper
ijircee_Template
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Anonymous Key Based Secure File Encryption in Cloud
iaetsd Secured multiple keyword ranked search over encrypted databases
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
IJSRED-V2I3P52
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Lecture Notes Electrical Wiring System Components
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Digital Logic Computer Design lecture notes
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
bas. eng. economics group 4 presentation 1.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
573137875-Attendance-Management-System-original
Lecture Notes Electrical Wiring System Components
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Embodied AI: Ushering in the Next Era of Intelligent Systems
Digital Logic Computer Design lecture notes
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mechanical Engineering MATERIALS Selection
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CYBER-CRIMES AND SECURITY A guide to understanding
Structs to JSON How Go Powers REST APIs.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS

JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

  • 1. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage ABSTRACT: Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
  • 2. EXISTING SYSTEM: Considering data privacy, a traditional way to ensure it is to rely on the server to enforce the access control after authentication, which means any unexpected privilege escalation will expose all data. In a shared-tenancy cloud computing environment, things become even worse. Regarding availability of files, there are a series of cryptographic schemes which go as far as allowing a third-party auditor to check the availability of files on behalf of the data owner without leaking anything about the data, or without compromising the data owners anonymity. Likewise, cloud users probably will not hold the strong belief that the cloud server is doing a good job in terms of confidentiality. A cryptographic solution, with proven security relied on number-theoretic assumptions is more desirable, whenever the user is not perfectly happy with trusting the security of the VM or the honesty of the technical staff. DISADVANTAGES OF EXISTING SYSTEM: 1. The costs and complexities involved generally increase with the number of the decryption keys to be shared. 2. The encryption key and decryption key are different in publickey encryption.
  • 3. PROPOSED SYSTEM: In this paper, we study how to make a decryption key more powerful in the sense that it allows decryption of multiple ciphertexts, without increasing its size. Specifically, our problem statement is “To design an efficient public-key encryption scheme which supports flexible delegation in the sense that any subset of the ciphertexts (produced by the encryption scheme) is decry ptable by a constant-size decryption key (generated by the owner of the master-secret key).” We solve this problem by introducing a special type of public-key encryption which we call key-aggregate cryptosystem (KAC). In KAC, users encrypt a message not only under a public-key, but also under an identifier of ciphertext called class. That means the ciphertexts are further categorized into different classes. The key owner holds a master-secret called master-secret key, which can be used to extract secret keys for different classes. More importantly, the extracted key have can be an aggregate key which is as compact as a secret key for a single class, but aggregates the power of many such keys, i.e., the decryption power for any subset of ciphertext classes.
  • 4. ADVANTAGES OF PROPOSED SYSTEM: 1. The extracted key have can be an aggregate key which is as compact as a secret key for a single class. 2. The delegation of decryption can be efficiently implemented with the aggregate key. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 5.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.