SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud
Storage
INTRODUCTION
 Cloud computing provides the flexible architecture to share the
application(software) as well as the other network
resources(hardware)
 Cloud storage enables networked online storage where data is
stored on multiple virtual servers, generally hosted by third
parties , rather than being hosted on dedicated servers
 Key management and key sharing plays the main role in the data
sharing concept of cloud computing
 Traditional key cryptosystems lack the enhanced security
techniques as the keys are generated by the existing random key
generation
 Proposed system said to have aggregate key cryptosystem in
which key generated by means of various derivations of cipher
text class properties of data and its associated keys
DISADVANTAGES OF EXISTING SYSTEM
 Unexpected privilege escalation will expose all
 It is not efficient
 Shared data will not be secure
 The costs and complexities involved generally increase with
the number of the decryption keys to be shared
 The encryption key and decryption key are different in public
key encryption
ADVANTAGES OF PROPOSED SYSTEM
 It is more secure
 Decryption key is sent via a secure channel and kept secret
 It is an efficient public-key encryption scheme which supports
flexible delegation
 The extracted key have can be an aggregate key which is as
compact as a secret key for a single class
 The delegation of decryption can be efficiently implemented with
the aggregate key
KEY-AGGREGATE ENCRYPTION
 A key aggregate encryption has five polynomial-time
algorithms
 Setup Phase
 KeyGen Phase
 Encrypt Phase
 Extract Phase
 Decrypt Phase
SETUP PHASE
 The data owner executes the setup phase for an account on
server which is not trusted
 The setup algorithm only takes implicit security parameter
KeyGen Phase
 This phase is executed by data owner to generate the public or
the master key pair (pk, msk)
Encrypt Phase
 This phase is executed by anyone who wants to send the
encrypted data
 Encrypt (pk, m, i), the encryption algorithm takes input as
public parameters pk, a message m, and i denoting ciphertext
class
 The algorithm encrypts message m and produces a ciphertext C
such that only a user that has a set of attributes that satisfies the
access structure is able to decrypt the message
 Input= public key pk, an index i, and message m
 Output = ciphertext C
Extract Phase
 This is executed by the data owner for delegating the
decrypting power for a certain set of ciphertext classes to a
delegate
 Input = master-secret key mk and a set S of indices
corresponding to different classes
 Outputs = aggregate key for set S denoted by kS
Decrypt Phase
 This is executed by the candidate who has the decryption
authorities. Decrypt (kS, S, i, C), the decryption algorithm
takes input as public parameters pk, a ciphertext C, i denoting
ciphertext classes for a set S of attributes
 Input = kS and the set S, where index i = ciphertext class
 Outputs = m if i element of S
Conclusion
 To share data flexibly is vital thing in cloud computing
 Users prefer to upload there data on cloud and among different users
 Outsourcing of data to server may lead to leak the private data of user
to everyone
 Encryption is a one solution which provides to share selected data with
desired candidate
 Sharing of decryption keys in secure way plays important role
 Public-key cryptosystems provides delegation of secret keys for
different ciphertext classes in cloud storage
 The delegatee gets securely an aggregate key of constant size
 It is required to keep enough number of cipher texts classes as they
increase fast and the ciphertext classes are bounded that is the
limitation
Key aggregate cryptosystem for scalable data sharing in cloud storage

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”
solarisyourep
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
Tejas_srinivas
 

Was ist angesagt? (20)

The Future of Cloud Computing in 2021
The Future of Cloud Computing in 2021The Future of Cloud Computing in 2021
The Future of Cloud Computing in 2021
 
Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??
 
Blockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on AzureBlockchain Essentials and Blockchain on Azure
Blockchain Essentials and Blockchain on Azure
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Dynamic synchronous transfer mode
Dynamic synchronous transfer modeDynamic synchronous transfer mode
Dynamic synchronous transfer mode
 
Types of blockchain
Types of blockchainTypes of blockchain
Types of blockchain
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction of Windows azure and overview
Introduction of Windows azure and overviewIntroduction of Windows azure and overview
Introduction of Windows azure and overview
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Key management
Key managementKey management
Key management
 
SSL
SSLSSL
SSL
 
1.Introduction to cloud computing converted
1.Introduction to cloud computing converted1.Introduction to cloud computing converted
1.Introduction to cloud computing converted
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”
 
3D Password
3D Password3D Password
3D Password
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information services
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 

Andere mochten auch

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Sasi Kumar
 

Andere mochten auch (12)

KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Peer to Peer Information Retrieval
Peer to Peer Information RetrievalPeer to Peer Information Retrieval
Peer to Peer Information Retrieval
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Ähnlich wie Key aggregate cryptosystem for scalable data sharing in cloud storage

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
Scott Payne
 

Ähnlich wie Key aggregate cryptosystem for scalable data sharing in cloud storage (20)

A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
Phase1
Phase1Phase1
Phase1
 
262 265
262 265262 265
262 265
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 

Kürzlich hochgeladen

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Key aggregate cryptosystem for scalable data sharing in cloud storage

  • 1. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  • 2. INTRODUCTION  Cloud computing provides the flexible architecture to share the application(software) as well as the other network resources(hardware)  Cloud storage enables networked online storage where data is stored on multiple virtual servers, generally hosted by third parties , rather than being hosted on dedicated servers  Key management and key sharing plays the main role in the data sharing concept of cloud computing
  • 3.  Traditional key cryptosystems lack the enhanced security techniques as the keys are generated by the existing random key generation  Proposed system said to have aggregate key cryptosystem in which key generated by means of various derivations of cipher text class properties of data and its associated keys
  • 4. DISADVANTAGES OF EXISTING SYSTEM  Unexpected privilege escalation will expose all  It is not efficient  Shared data will not be secure  The costs and complexities involved generally increase with the number of the decryption keys to be shared  The encryption key and decryption key are different in public key encryption
  • 5. ADVANTAGES OF PROPOSED SYSTEM  It is more secure  Decryption key is sent via a secure channel and kept secret  It is an efficient public-key encryption scheme which supports flexible delegation  The extracted key have can be an aggregate key which is as compact as a secret key for a single class  The delegation of decryption can be efficiently implemented with the aggregate key
  • 6. KEY-AGGREGATE ENCRYPTION  A key aggregate encryption has five polynomial-time algorithms  Setup Phase  KeyGen Phase  Encrypt Phase  Extract Phase  Decrypt Phase
  • 7. SETUP PHASE  The data owner executes the setup phase for an account on server which is not trusted  The setup algorithm only takes implicit security parameter
  • 8. KeyGen Phase  This phase is executed by data owner to generate the public or the master key pair (pk, msk)
  • 9. Encrypt Phase  This phase is executed by anyone who wants to send the encrypted data  Encrypt (pk, m, i), the encryption algorithm takes input as public parameters pk, a message m, and i denoting ciphertext class  The algorithm encrypts message m and produces a ciphertext C such that only a user that has a set of attributes that satisfies the access structure is able to decrypt the message  Input= public key pk, an index i, and message m  Output = ciphertext C
  • 10. Extract Phase  This is executed by the data owner for delegating the decrypting power for a certain set of ciphertext classes to a delegate  Input = master-secret key mk and a set S of indices corresponding to different classes  Outputs = aggregate key for set S denoted by kS
  • 11. Decrypt Phase  This is executed by the candidate who has the decryption authorities. Decrypt (kS, S, i, C), the decryption algorithm takes input as public parameters pk, a ciphertext C, i denoting ciphertext classes for a set S of attributes  Input = kS and the set S, where index i = ciphertext class  Outputs = m if i element of S
  • 12. Conclusion  To share data flexibly is vital thing in cloud computing  Users prefer to upload there data on cloud and among different users  Outsourcing of data to server may lead to leak the private data of user to everyone  Encryption is a one solution which provides to share selected data with desired candidate  Sharing of decryption keys in secure way plays important role  Public-key cryptosystems provides delegation of secret keys for different ciphertext classes in cloud storage  The delegatee gets securely an aggregate key of constant size  It is required to keep enough number of cipher texts classes as they increase fast and the ciphertext classes are bounded that is the limitation