SlideShare a Scribd company logo
Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud
Storage
INTRODUCTION
 Cloud computing provides the flexible architecture to share the
application(software) as well as the other network
resources(hardware)
 Cloud storage enables networked online storage where data is
stored on multiple virtual servers, generally hosted by third
parties , rather than being hosted on dedicated servers
 Key management and key sharing plays the main role in the data
sharing concept of cloud computing
 Traditional key cryptosystems lack the enhanced security
techniques as the keys are generated by the existing random key
generation
 Proposed system said to have aggregate key cryptosystem in
which key generated by means of various derivations of cipher
text class properties of data and its associated keys
DISADVANTAGES OF EXISTING SYSTEM
 Unexpected privilege escalation will expose all
 It is not efficient
 Shared data will not be secure
 The costs and complexities involved generally increase with
the number of the decryption keys to be shared
 The encryption key and decryption key are different in public
key encryption
ADVANTAGES OF PROPOSED SYSTEM
 It is more secure
 Decryption key is sent via a secure channel and kept secret
 It is an efficient public-key encryption scheme which supports
flexible delegation
 The extracted key have can be an aggregate key which is as
compact as a secret key for a single class
 The delegation of decryption can be efficiently implemented with
the aggregate key
KEY-AGGREGATE ENCRYPTION
 A key aggregate encryption has five polynomial-time
algorithms
 Setup Phase
 KeyGen Phase
 Encrypt Phase
 Extract Phase
 Decrypt Phase
SETUP PHASE
 The data owner executes the setup phase for an account on
server which is not trusted
 The setup algorithm only takes implicit security parameter
KeyGen Phase
 This phase is executed by data owner to generate the public or
the master key pair (pk, msk)
Encrypt Phase
 This phase is executed by anyone who wants to send the
encrypted data
 Encrypt (pk, m, i), the encryption algorithm takes input as
public parameters pk, a message m, and i denoting ciphertext
class
 The algorithm encrypts message m and produces a ciphertext C
such that only a user that has a set of attributes that satisfies the
access structure is able to decrypt the message
 Input= public key pk, an index i, and message m
 Output = ciphertext C
Extract Phase
 This is executed by the data owner for delegating the
decrypting power for a certain set of ciphertext classes to a
delegate
 Input = master-secret key mk and a set S of indices
corresponding to different classes
 Outputs = aggregate key for set S denoted by kS
Decrypt Phase
 This is executed by the candidate who has the decryption
authorities. Decrypt (kS, S, i, C), the decryption algorithm
takes input as public parameters pk, a ciphertext C, i denoting
ciphertext classes for a set S of attributes
 Input = kS and the set S, where index i = ciphertext class
 Outputs = m if i element of S
Conclusion
 To share data flexibly is vital thing in cloud computing
 Users prefer to upload there data on cloud and among different users
 Outsourcing of data to server may lead to leak the private data of user
to everyone
 Encryption is a one solution which provides to share selected data with
desired candidate
 Sharing of decryption keys in secure way plays important role
 Public-key cryptosystems provides delegation of secret keys for
different ciphertext classes in cloud storage
 The delegatee gets securely an aggregate key of constant size
 It is required to keep enough number of cipher texts classes as they
increase fast and the ciphertext classes are bounded that is the
limitation
Key aggregate cryptosystem for scalable data sharing in cloud storage

More Related Content

PPTX
key aggregate cryptosystem for scalable data sharing in cloud
PPT
Cloud presentation
PPT
Implementing Public-Key-Infrastructures
PPTX
Symmetric and Asymmetric Encryption
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PDF
Steganography Project
PPTX
DOCX
project-report-steganography.docx
key aggregate cryptosystem for scalable data sharing in cloud
Cloud presentation
Implementing Public-Key-Infrastructures
Symmetric and Asymmetric Encryption
AUDIO STEGANOGRAPHY PRESENTATION
Steganography Project
project-report-steganography.docx

What's hot (20)

PDF
AWS Services_ An In-Depth Study-documentation
PDF
Introduction to Cryptography
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PPTX
Steganoghraphy
DOC
Certification authority
PPTX
Seminar ppt on digital signature
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
DOC
Методи за криптиране и декриптиране на данни
PPTX
Privacy-enhancing technologies and Blockchain
PPT
X.509 Certificates
PPTX
Idea (international data encryption algorithm)
PPTX
Automotive Cybersecurity: The Gap Still Exists
PPTX
Internet security protocol
PPTX
Cloud Security Mechanisms
PPTX
One time pad Encryption:
PPTX
Introduction to Public Key Infrastructure
PPTX
Mobile devices hardware characteristics
PPT
E-mail Security in Network Security NS5
DOCX
Unit 1 DVWA (Damn Vulnerable Web Application).docx
AWS Services_ An In-Depth Study-documentation
Introduction to Cryptography
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Steganoghraphy
Certification authority
Seminar ppt on digital signature
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Методи за криптиране и декриптиране на данни
Privacy-enhancing technologies and Blockchain
X.509 Certificates
Idea (international data encryption algorithm)
Automotive Cybersecurity: The Gap Still Exists
Internet security protocol
Cloud Security Mechanisms
One time pad Encryption:
Introduction to Public Key Infrastructure
Mobile devices hardware characteristics
E-mail Security in Network Security NS5
Unit 1 DVWA (Damn Vulnerable Web Application).docx
Ad

Viewers also liked (13)

PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Peer to Peer Information Retrieval
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
PPTX
A hybrid cloud approach for secure authorized deduplication.
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
2015 Upload Campaigns Calendar - SlideShare
PPTX
What to Upload to SlideShare
PDF
Getting Started With SlideShare
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Key aggregate cryptosystem for scalable data sharing in cloud storage
Peer to Peer Information Retrieval
Key aggregate cryptosystem for scalable data sharing in cloud storage
Scalable face image retrieval using attribute enhanced sparse codewords
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Key aggregate cryptosystem for scalable data sharing in cloud
Scalable and secure sharing of personal health records in cloud computing usi...
A hybrid cloud approach for secure authorized deduplication.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
2015 Upload Campaigns Calendar - SlideShare
What to Upload to SlideShare
Getting Started With SlideShare
Ad

Similar to Key aggregate cryptosystem for scalable data sharing in cloud storage (20)

PDF
A Review Paper on Secure authentication and data sharing in cloud storage usi...
PDF
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PDF
Psdot 12 a secure erasure code-based cloud storage
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PPT
PDF
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
PPTX
An efficient certificateless encryption for data sharing on public cloud
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
561 1530-1-pb (1)
PDF
Iaetsd a survey on cloud storage security with
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PDF
ijircee_Template
PDF
REU Group 2 - Paper
PDF
Mutual query data sharing protocol for public key encryption through chosen-c...
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
PDF
Improving Efficiency of Security in Multi-Cloud
PPT
Client server computing in mobile environments part 2
A Review Paper on Secure authentication and data sharing in cloud storage usi...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Psdot 12 a secure erasure code-based cloud storage
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
key-aggregate cryptosystem for scalable data sharing in cloud storage
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
An efficient certificateless encryption for data sharing on public cloud
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
561 1530-1-pb (1)
Iaetsd a survey on cloud storage security with
key-aggregate cryptosystem for scalable data sharing in cloud storage
ijircee_Template
REU Group 2 - Paper
Mutual query data sharing protocol for public key encryption through chosen-c...
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Improving Efficiency of Security in Multi-Cloud
Client server computing in mobile environments part 2

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Project quality management in manufacturing
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
573137875-Attendance-Management-System-original
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
composite construction of structures.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Foundation to blockchain - A guide to Blockchain Tech
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Project quality management in manufacturing
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
573137875-Attendance-Management-System-original
Automation-in-Manufacturing-Chapter-Introduction.pdf
composite construction of structures.pdf
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
bas. eng. economics group 4 presentation 1.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Key aggregate cryptosystem for scalable data sharing in cloud storage

  • 1. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  • 2. INTRODUCTION  Cloud computing provides the flexible architecture to share the application(software) as well as the other network resources(hardware)  Cloud storage enables networked online storage where data is stored on multiple virtual servers, generally hosted by third parties , rather than being hosted on dedicated servers  Key management and key sharing plays the main role in the data sharing concept of cloud computing
  • 3.  Traditional key cryptosystems lack the enhanced security techniques as the keys are generated by the existing random key generation  Proposed system said to have aggregate key cryptosystem in which key generated by means of various derivations of cipher text class properties of data and its associated keys
  • 4. DISADVANTAGES OF EXISTING SYSTEM  Unexpected privilege escalation will expose all  It is not efficient  Shared data will not be secure  The costs and complexities involved generally increase with the number of the decryption keys to be shared  The encryption key and decryption key are different in public key encryption
  • 5. ADVANTAGES OF PROPOSED SYSTEM  It is more secure  Decryption key is sent via a secure channel and kept secret  It is an efficient public-key encryption scheme which supports flexible delegation  The extracted key have can be an aggregate key which is as compact as a secret key for a single class  The delegation of decryption can be efficiently implemented with the aggregate key
  • 6. KEY-AGGREGATE ENCRYPTION  A key aggregate encryption has five polynomial-time algorithms  Setup Phase  KeyGen Phase  Encrypt Phase  Extract Phase  Decrypt Phase
  • 7. SETUP PHASE  The data owner executes the setup phase for an account on server which is not trusted  The setup algorithm only takes implicit security parameter
  • 8. KeyGen Phase  This phase is executed by data owner to generate the public or the master key pair (pk, msk)
  • 9. Encrypt Phase  This phase is executed by anyone who wants to send the encrypted data  Encrypt (pk, m, i), the encryption algorithm takes input as public parameters pk, a message m, and i denoting ciphertext class  The algorithm encrypts message m and produces a ciphertext C such that only a user that has a set of attributes that satisfies the access structure is able to decrypt the message  Input= public key pk, an index i, and message m  Output = ciphertext C
  • 10. Extract Phase  This is executed by the data owner for delegating the decrypting power for a certain set of ciphertext classes to a delegate  Input = master-secret key mk and a set S of indices corresponding to different classes  Outputs = aggregate key for set S denoted by kS
  • 11. Decrypt Phase  This is executed by the candidate who has the decryption authorities. Decrypt (kS, S, i, C), the decryption algorithm takes input as public parameters pk, a ciphertext C, i denoting ciphertext classes for a set S of attributes  Input = kS and the set S, where index i = ciphertext class  Outputs = m if i element of S
  • 12. Conclusion  To share data flexibly is vital thing in cloud computing  Users prefer to upload there data on cloud and among different users  Outsourcing of data to server may lead to leak the private data of user to everyone  Encryption is a one solution which provides to share selected data with desired candidate  Sharing of decryption keys in secure way plays important role  Public-key cryptosystems provides delegation of secret keys for different ciphertext classes in cloud storage  The delegatee gets securely an aggregate key of constant size  It is required to keep enough number of cipher texts classes as they increase fast and the ciphertext classes are bounded that is the limitation