Full Paper View Go Back
Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic
Ajay Hirne1 , Shital Namdev2 , H.S. Tomar3
Section:Research Paper, Product Type: Isroset-Journal
Vol.4 ,
Issue.2 , pp.15-19, Apr-2016
Online published on Apr 27, 2016
Copyright © Ajay Hirne, Shital Namdev, H.S. Tomar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ajay Hirne, Shital Namdev, H.S. Tomar, “Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic,” International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
MLA Style Citation: Ajay Hirne, Shital Namdev, H.S. Tomar "Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic." International Journal of Scientific Research in Computer Science and Engineering 4.2 (2016): 15-19.
APA Style Citation: Ajay Hirne, Shital Namdev, H.S. Tomar, (2016). Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic. International Journal of Scientific Research in Computer Science and Engineering, 4(2), 15-19.
BibTex Style Citation:
@article{Hirne_2016,
author = {Ajay Hirne, Shital Namdev, H.S. Tomar},
title = {Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {2},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {15-19},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=355},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=355
TI - Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Ajay Hirne, Shital Namdev, H.S. Tomar
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 15-19
IS - 2
VL - 4
SN - 2347-2693
ER -
Abstract :
Secure Cloud Storage is an online platform for storing user data with sharing facilities among other users. The data is optionally encrypted before storing and decrypted on download by the system and the process is transparent to the end user. The platform also provides marking data private or public such that all public data are visible to end user and can perform search or download request to the owner. The data owner or user can audit all such request and grant download access to individual or multiple files accordingly. Each file on our system is encrypted using different AES key and the real challenge come when multiple file needs to be shared between users. This constraint is addressed by applying a concept known as Key Aggregation which states the generation of constant size key for a single or multiple files and thereby end user can easily decrypt the shared files.
Key-Words / Index Term :
Data Sharing, Key Aggregation, Java Keystore, Private Key Cryptography, Encryption, Decryption
References :
[1]. Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey, Tzeng, Jianying Zhou and Robert H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” IEEE Transactions On Parallel and Distributed System, Vol 25, No. 2, pp.265-272, 2014.
[2]. Mewada, Shivlal, Arti Sharivastava, Pradeep Sharma, S. S. Gautam, and N. Purohit. "Performance Analysis of Encryption Algorithm in Cloud Computing.", International Journal of Computer Sciences and Engineering Vol.3, Issue.2, PP.83-89, 2015.
[3]. S.Sujitha and S. J. Mohana, "Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.181-184, 2015.
[4]. Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Delhi, pp.663-666, 2016,
[5]. P. Kuppuswamy, "Enrichment of Mobile data Security over Cloud storage using New Asymmetric key algorithm", International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.133-138, 2016.
[6]. Sonali A. Karale, Sachin D. Choudhari, "Key Aggregate Cryptography in Cloud for Scalable Data Sharing", International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.91-95, 2016.
[7]. Anjali Nigam, Vineet Singh, "Securing Data Transmission in Cloud using Encryption Algorithms", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (21-25), Jun -2016, E-ISSN: 2347-2693
[8]. Indu Sharma and Mandeep kaur, "Securing Data from Data Manipulation Using NAIVE String Search Algorithm and NTRU Algo in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.393-397, 2015.
[9]. Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security, Vol.14, No.2, pp.105-110, 2016
[10]. Sadiya Shakil and Vineet Singh, "Security of Personal Data on Internet of Things Using AES", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.35-39, 2016.
[11]. R. Durga Prasad, R.N.D.S.S Kiran, Andey Krishnaji, "Advanced Data Encryption/Decryption using Multi Codes for One Character", International Journal of Computer Sciences and Engineering, Vol.3, Issue.09, pp.34-38, 2015.
[12]. Shivlal, P Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp.1-5, 2016. Doi: 10.1109/CDAN.2016.7570921
[13]. Santhiya.C, Vanishree K.A. and M.K. Chandrasekaran Ph.D., "Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.242-247, 2015.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.