SlideShare a Scribd company logo
T.SRAVANI
(11541A0538)
G.KOTESWARA RAO M.ABHILASH
(11541A0509) (11541A0521)
P.SHEETALCHAITANYA M.VASUDEVA REDDY
(11541A0529) (11541A0515)
Under The Guidence Of
G.SURESH KUMAR, M.Tech
CONTENTS
 Introduction
 Abstract
 Existing System
 Proposed System
 System Architecture
 Modules
 System Requirements
INTRODUCTION
 The word Cloud Computing mean?
 What does Cloud Computing mean?
 In the Cloud Computing the apps and files are hosted
consisting of thousands of computers and servers &and
linked together ,they are accessed via internet.
 By using Cloud Computing we can access all the apps and
documents from anywhere in the world.
ABSTRACT
 Data sharing is an important functionality in cloud storage.
 Here we show how to securely, efficiently, and flexibly
share data with others in cloud storage.
 We describe new public-key cryptosystems that produce
constant-size ciphertexts.
 One can aggregate any set of secret keys and make them as
compact as a single key, but encompassing the power of all
the keys being aggregated.
 The secret key holder can release a constant-size
aggregate key for flexible choices of ciphertext set.
 This compact aggregate key can be conveniently sent
to others or be stored in a smart card with very
limited secure storage.
 We also describe other application of our schemes.
 In particular, our schemes give the first public-key
patient-controlled encryption for flexible hierarchy,
which was yet to be known.
EXISTING SYSTEM
 Considering data privacy, a traditional way to ensure
it is to access control after authentication, which
means any unexpected privilege escalation will
expose all data.
 In a shared-tenancy cloud computing environment,
things become even worse.
 Regarding availability of files, there are a series of
cryptographic schemes which go as far as allowing a
third-party auditor to check the availability of files of
the data owner without leaking
DISADVANTAGES OF EXISTING SYSTEM
 The costs and complexities involved generally
increase with the number of the decryption keys
to be shared.
 The encryption key and decryption key are
different in publickey encryption.
PROPOSED SYSTEM
 In this paper, we study how to make a decryption key
more powerful in the sense that it allows decryption
of multiple ciphertexts, without increasing its size.
 Specifically, our problem statement is “To design an
efficient public-key encryption scheme which
supports flexible delegation in the sense that
any subset of the ciphertexts is decry ptable by a
constant-size decryption key ”.
 We solve this problem by introducing a special type
of public-key encryption which we call key-aggregate
cryptosystem (KAC).
 In KAC, users encrypt a message not only under a
public-key, but also under an identifier of
ciphertext called class.
 The key owner holds a master-secret called
master-secret key, which can be used to extract
secret keys for different classes.
 the extracted key have can be an aggregate key
which is as compact as a secret key for a single
class, but aggregates the power of many such
keys
ADVANTAGES OF PROPOSED SYSTEM
 The extracted key have can be an aggregate key
which is as compact as a secret key for a single
class.
 The delegation of decryption can be efficiently
implemented with the aggregate key.
SYSTEM ARCHITECTURE
MODULES
 Setup Phase
 Encrypt Phase
 Key Gen Phase
 Decrypt Phase
Setup Phase
 The setup algorithm takes no input other than the
implicit security parameter.
 It outputs the public parameters PK and a master key
MK.
Encrypt Phase
 Encrypt(PK,M, A). The encryption algorithm takes as
input the public parameters PK, a message M, and an
access structure A over the universe of attributes.
 The algorithm will encrypt M and produce a ciphertext
CT such that only a user that possesses a set of
attributes that satisfies the structure will be able to
decrypt the message.
Key Gen Phase
 Key Generation(MK,S). The key generation algorithm takes
as input the master key MK and a set of attributes S that
describe the key. It outputs a private key SK .
 This can be observed in the architecture as shown in the
next slide
Key aggregate cryptosystem for scalable data sharing in cloud
Decrypt Phase
 Decrypt(PK, CT, SK). The decryption algorithm takes
as input the public parameters PK, a ciphertext CT,
which contains an access policy A, and a privatekey SK,
which is a private key for a set S of attributes.
 If the set S of attributes satisfies the access structure A
then the algorithm will decrypt the ciphertext and
return a message M.
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS:-
 System : Intel i3 processor
 Hard Disk : 40 GB
 Monitor : 15 VGA Colour
 Ram : 1 Gb
SOFTWARE REQUIREMENTS:-
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL
Key aggregate cryptosystem for scalable data sharing in cloud

More Related Content

ODP
Día de la mujer trabajadora.
PDF
1. La información en las organizaciones
PPTX
Computación forense
PDF
Filosofía y moda. Una defensa de la importancia de la contemplación
PPS
La cucaracha
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
Día de la mujer trabajadora.
1. La información en las organizaciones
Computación forense
Filosofía y moda. Una defensa de la importancia de la contemplación
La cucaracha
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud storage

Viewers also liked (17)

PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
PDF
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOCX
A hybrid cloud approach for secure authorized deduplication
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Data Sharing: Ensure Accountability Distribution in the Cloud
PPTX
Ensuring Distributed Accountability in the Cloud
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Ensuring Distributed Accountability in the Cloud
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
PDF
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
PPTX
Editing ppt
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
A hybrid cloud approach for secure authorized deduplication
Key aggregate cryptosystem for scalable data sharing in cloud storage
Data Sharing: Ensure Accountability Distribution in the Cloud
Ensuring Distributed Accountability in the Cloud
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
key-aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Ensuring Distributed Accountability in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editing ppt
Ad

Similar to Key aggregate cryptosystem for scalable data sharing in cloud (20)

PDF
A Review Paper on Secure authentication and data sharing in cloud storage usi...
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Cyber security workshop talk.pptx
PDF
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
PPT
6. cryptography
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
PDF
ijircee_Template
PPTX
Achieving Secure And Scalable Cloud computing
PPTX
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
PDF
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
PDF
PDF
Iaetsd a survey on cloud storage security with
A Review Paper on Secure authentication and data sharing in cloud storage usi...
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
Cyber security workshop talk.pptx
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
6. cryptography
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Secure Data Storage on Cloud System for Privacy Preserving
ijircee_Template
Achieving Secure And Scalable Cloud computing
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
Iaetsd a survey on cloud storage security with
Ad

Recently uploaded (20)

PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Insiders guide to clinical Medicine.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Classroom Observation Tools for Teachers
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Renaissance Architecture: A Journey from Faith to Humanism
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
Microbial disease of the cardiovascular and lymphatic systems
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Classroom Observation Tools for Teachers

Key aggregate cryptosystem for scalable data sharing in cloud

  • 1. T.SRAVANI (11541A0538) G.KOTESWARA RAO M.ABHILASH (11541A0509) (11541A0521) P.SHEETALCHAITANYA M.VASUDEVA REDDY (11541A0529) (11541A0515) Under The Guidence Of G.SURESH KUMAR, M.Tech
  • 2. CONTENTS  Introduction  Abstract  Existing System  Proposed System  System Architecture  Modules  System Requirements
  • 3. INTRODUCTION  The word Cloud Computing mean?  What does Cloud Computing mean?  In the Cloud Computing the apps and files are hosted consisting of thousands of computers and servers &and linked together ,they are accessed via internet.  By using Cloud Computing we can access all the apps and documents from anywhere in the world.
  • 4. ABSTRACT  Data sharing is an important functionality in cloud storage.  Here we show how to securely, efficiently, and flexibly share data with others in cloud storage.  We describe new public-key cryptosystems that produce constant-size ciphertexts.  One can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated.
  • 5.  The secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set.  This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage.  We also describe other application of our schemes.  In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.
  • 6. EXISTING SYSTEM  Considering data privacy, a traditional way to ensure it is to access control after authentication, which means any unexpected privilege escalation will expose all data.  In a shared-tenancy cloud computing environment, things become even worse.  Regarding availability of files, there are a series of cryptographic schemes which go as far as allowing a third-party auditor to check the availability of files of the data owner without leaking
  • 7. DISADVANTAGES OF EXISTING SYSTEM  The costs and complexities involved generally increase with the number of the decryption keys to be shared.  The encryption key and decryption key are different in publickey encryption.
  • 8. PROPOSED SYSTEM  In this paper, we study how to make a decryption key more powerful in the sense that it allows decryption of multiple ciphertexts, without increasing its size.  Specifically, our problem statement is “To design an efficient public-key encryption scheme which supports flexible delegation in the sense that any subset of the ciphertexts is decry ptable by a constant-size decryption key ”.  We solve this problem by introducing a special type of public-key encryption which we call key-aggregate cryptosystem (KAC).
  • 9.  In KAC, users encrypt a message not only under a public-key, but also under an identifier of ciphertext called class.  The key owner holds a master-secret called master-secret key, which can be used to extract secret keys for different classes.  the extracted key have can be an aggregate key which is as compact as a secret key for a single class, but aggregates the power of many such keys
  • 10. ADVANTAGES OF PROPOSED SYSTEM  The extracted key have can be an aggregate key which is as compact as a secret key for a single class.  The delegation of decryption can be efficiently implemented with the aggregate key.
  • 12. MODULES  Setup Phase  Encrypt Phase  Key Gen Phase  Decrypt Phase
  • 13. Setup Phase  The setup algorithm takes no input other than the implicit security parameter.  It outputs the public parameters PK and a master key MK.
  • 14. Encrypt Phase  Encrypt(PK,M, A). The encryption algorithm takes as input the public parameters PK, a message M, and an access structure A over the universe of attributes.  The algorithm will encrypt M and produce a ciphertext CT such that only a user that possesses a set of attributes that satisfies the structure will be able to decrypt the message.
  • 15. Key Gen Phase  Key Generation(MK,S). The key generation algorithm takes as input the master key MK and a set of attributes S that describe the key. It outputs a private key SK .  This can be observed in the architecture as shown in the next slide
  • 17. Decrypt Phase  Decrypt(PK, CT, SK). The decryption algorithm takes as input the public parameters PK, a ciphertext CT, which contains an access policy A, and a privatekey SK, which is a private key for a set S of attributes.  If the set S of attributes satisfies the access structure A then the algorithm will decrypt the ciphertext and return a message M.
  • 18. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS:-  System : Intel i3 processor  Hard Disk : 40 GB  Monitor : 15 VGA Colour  Ram : 1 Gb SOFTWARE REQUIREMENTS:-  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL