SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 53-59
www.iosrjournals.org
DOI: 10.9790/0661-17115359 www.iosrjournals.org 53 | Page
Secure Data Sharing Using Compact Summation key in Hybrid
Cloud Storage
Pratap M Mohite, DipaDharmadhikari,RavindraBankar
(Computer Science &Engineering,Marathwada Institute of Technology, India)
(Computer Science &Engineering,Marathwada Institute of Technology, India)
(Master of Computer Applications,Dr.BAMU, India)
Abstract: Data security is crucial aspect in cloud storage. Providing security to a single file or to set of files is
another important factor. In cloud, security is applied to a set of files i.e. to central location. In file sharing
approach a single key can be used to gain access to storage. Applying security to each file in cloud is not
possible with cloud environment. To solve this type ofproblems, new improved key assignment scheme have to
be used. New improved algorithm that satisfies these conditions is summation key encryption. Summation key is
of power more than two keys. It takes one public key, known to both parties & another key is generated using
keygen algorithm. Data owner retrieves the summation key from the alternatives made to share data. This key
can be dispatch to second user using secure channel for example email or smart cards. Summation key is
compact in size & also decrease the size of files after encryption. Time duration required to generate summation
key is very short as compare to Identity based or Attribute based encryption scheme.Practically how this
algorithm is beneficial to provide security to individual files in cloud repositoryis described here.
Keywords: Cloud Server,Data Sharing, Data Security, Hybrid Cloud, Summation key.
I. Introduction
Cloud system provides data sharing capabilities;this can provide an abundant of benefits to the users.
There is currently a push for information technology industries to increase their data sharing efforts. In
information technology industry there is tremendous increase in data outsourcing. Data can be outsourced or
infrastructure can be shared or software can be used. Cloud services divide into three categories infrastructure as
a service, platform as a service & software as a service. Infrastructure as a service is provision model in which
on organization outsourced the equipment used to support operations including storage, hardware, servers &
networking components. Platform as a service is a way of rent hardware, operating system storage & network
capacity over the internet. Software as a service is a software distribution model in which applications are
hosted by a vendors or service provider & made available to customers over network typically the internet.
Data privacy isa traditional way to shield access control mechanism after conventional authentication.
Any unauthorized person can procure access & reveal all data. Sharing data over cloud encounters some security
related problems. Files shared from different clients can be hosted on different virtual machines for example
virtualization in Linux, but whole data is stored on single machine. Data in target virtual machine could be
stolen by instantiation another virtual machine co-resistance with victim machine. Multiple cryptographic
schemes are used to store & check availability of files on behalf of data owner but can’t leak anything from that.
But data owner can’t depend totally on cloud server due to lack of confidentiality.
For this purpose data owner has to use some security policies to prevent unauthorized person to take
data without permission of data owner. This will lead to manipulate some cryptographic methods while
uploading data on cloud server. Principle term related to cloud is data sharing, but appraise the cloud computing
environment propound without exposing mission critical applications and data to third party vulnerabilities.
Data owner can use website or any application to share his private data with his friends. Consider D as
a set of whole data & 1 2 3, ,d ,..., nd d d are data elements i.e. 1 2 3{ , , ,...,d }nD d d d
Data owner desire to share only some data for ex: 1 2,d d with his friend .This sort of action cannot
possible in cloud computing environment. Reason behind this, data owner has not specified 1 2,d d data
separately; data is bunch of files. Using only one key data owner can gain access to data & he has to share that
key also. His friend can see the whole dataset D.
From Fig 1, Assume that Peter puts his personal data on cloud storage & he does not desire that his
distinctive data will not be available to everyone. Due to much security violation possibilities he cannot totally
relied on cloud storage. To prevent this, whole data D is stored on to cloud. But after some days his friend Anna
Want some photos from dataset D. At this situation Peter has to give his secret key to decrypt D set. By using
only one single key Anna can gain access to whole set of data D& she would be take another files from set.
To prevent such situation Peter has to possible ways,
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 54 | Page
1) Either apply a single key to whole dataset D , k(D) Or
2) Apply keys to each elements in dataset for ex, 1 2 3, ,d ,..., nd d d i.e. 1 1 2 2 3 3( ), ( ), (d )... ( )n nk d k d k k d
Figure 1 Data Sharing inTraditional Cloud System
First method is adverse because by using one single key Anna can obtain all data stored in cloud
storage. In second method, applying each file a key can unbearable because of number of keys are as many as
the number of files, say thousands. Transferring such keys requires a reliable storage the values & complication
involved generally grow with the number of decryption keys to be shared. Encryption keys also come with two
flavors symmetric key encryption& asymmetric key encryption.In symmetric key encryption scheme, Anna
&Peter share a single common key to perform encryption & decryption operations. In asymmetric key scheme,
Anna & Peter have different encryption and decryption keys. Flexibility is main application of public key
encryption. For example in organization, every member can upload encrypted data on the cloud server without
the knowledge of master secret key.
Therefore the best solution for above problem is that Peter encrypts all files with unique public keys,
but only sends Anna a single decryption key which is constant in size that is called as summation key Fig 2.
This key can be sent via a secure channel called email or a smart card or wireless sensor network. Basic aim of
current system is to minimize hardware and communication cost as well as time duration of key generation.
There are various cryptographic schemes; those can be used to apply security mechanism over cloud
storage but some lack in size & some are in integrity. Those are demonstrated in next section.
Figure 2 Data sharing in Cloud Storage Using Summation Key.
II. Related work
1. Types of Cryptography
1.1 Predefined Hierarchical Scheme
Predefined Hierarchical Schemes [1] aim to minimize the cost in storing and managing secret keys for
general cryptographic use. Employing a tree structure a secrete key for a given arm can be used to procured the
secret keys of its child nodes.Sandhu [2] proposed a technique to initiate a tree hierarchy of symmetric keys by
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 55 | Page
using reiterated evaluations of pseudo random functions block cipher on stable secret. This notion can be
verbalized from a tree to a graph.Another more advanced cryptographic key assignment schemes bears access
policy that can be modelled by an acyclic graph [3].Most of these schemes construct keys for symmetric key
cryptosystems, even though the key derivation may require modular arithmetic as used in public key
cryptosystems, which are more expensive than” symmetric key operation” such as pseudorandom function[4].
Taking tree structure as an example, Peter can first classify the ciphertext classes according to their subjects like
Fig 3.
(a)
(b)
Figure 3 a) One Key for Hierarchy, b) Four Keys for Hierarchy
Each node in the tree represents a secret key, while the leaf nodes represent the keys for individual
ciphertext classes. Filled rectangles represent the keys for the classes to be delegated and circles circumvented
by dotted lines represent the keys to be granted. Note that every key of the non-leaf node canderive the keys of
its descendant nodes. In Fig 3(a), if Peter wants to share all the files in the “personal” category, he only needs to
grant the keyfor the node “personal”, which automatically grants thedelegate the keys of all the descendant
nodes (“photo”,“music”). This is the ideal case, where most classes tobe shared belong to the same branch and
thus a parent key of them is sufficient. However, it is still difficult for general cases. As shown in Fig 3(b), if
Peter shares his demomusic at work (“work”→“casual”→“demo” and“work”→“confidential”→“demo”) with a
colleaguewho also has the rights to see some of her personaldata, what she can do is to give more keys, which
leadsto an increase in the total key size. One can see thatthis approach is not flexible when the
classificationshare more complex and she wants to share different setsof files to different people [5].
For this delegate in ourexample, the number of granted secret keys becomesthe same as the number of
classes.In general, hierarchical approaches can solve the problem partially if one intends to share all files under
a certain branch in the hierarchy. On average, the number ofkeys increases with the number of branches. It is
unlikelyto come up with a hierarchy that can save the numberof total keys to be granted for all individuals
(which canaccess a different set of leaf-nodes) simultaneously [6].
1.2 Attribute-based encryption
Attribute is analogues with cipher text. Data owner with master secret key can obtain a secrete key for
the policy of attributes so that a ciphertext can be decrypted by this key if its associated attributes conforms to
policy. Each attribute is associated with data this leads to increase in size of keys. For example with the secret
key for the policy (2V3V6V8), one can decrypt ciphertext tagged with class 2, 3, 6 or 8 [7].The measure
perturbed in attribute based encryption is collusion-resistance but not the compactness of secret keys. Actually,
the size of the key often increases linearly with the number of attributes it encompasses, or the ciphertext-size is
not immutable. To delegate the decryption power of some ciphertexts without sending the secret key to the
delegate, a useful primitive is proxy re-encryption (PRE) [8]
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 56 | Page
A PRE permits peter to delegate tothe server (proxy) the ability to transform the ciphertexts encrypted
under her public-key into ones for. PRE is well known to have innumerable applications including
cryptographic file system. Nevertheless, Anna has to trustworthy the proxy that it only turns ciphertexts
according to her instruction, which is what user wants to avoid at the first place [9]. Even worse, if the proxy
colludes with, some form of Anna’s secret key can be recovered which can decrypt Anna’s (convertible)
ciphertexts without Peter’s further help. That also means that the transformation key of proxy should be well
protected Using PRE just moves the secure key storage requirement from the delegate to the proxy. It is thus
undesirable to let the proxy reside in the storage server. That will also be inconvenient since every decryption
requires separate interaction with the proxy.
1.3 Identity Based Encryption
Identity-based encryption (IBE) is a type of public-key encryption in which the public-key of a user
can be assign as an identity-string of the user (e.g. an email address). There is a trusted party called private key
generator (PKG) in IBE which holds a master-secret key and issues a confidential key to each user concerning
to the user identity. The encrypt or can take the public parameter and a user singularity to encrypt a message.
The recipient can decrypt this ciphertext by his secret key [10].
Guoetet al, tried to build IBE with key aggregation. One of their schemes assumes random oracles but
another does not. In their schemes, key aggregation is constrained in the sense that all keys to be summarize
must come from different “identity divisions” [11]. While there are an exponential number of identities and thus
secret keys, only a polynomial number of them can be summarize.
Most importantly, their key-aggregation [12], comes at the expense of ( )O n sizes for both ciphertexts
and the public parameter, where nis the number of secret keys which can be summation into a constant size one.
This substantiallygrows the costs of storing and transmitting ciphertexts, which is inappropriate in many cases
such as shared cloud storage. As mentioned, in this scheme, feature constant ciphertext size, and their security
holds in the standard model. In fuzzy IBE [13], one single compact secret key can decrypt ciphertexts encrypted
under many identities which are close in a certain metric space, but not for an arbitrary set of identities and
therefore it does not match with our idea of key aggregation.
Table 1: key Assignment Schemes
Scheme Name Decryption Key Encryption Key
Predefined key hierarchy Not Constant Constant
Compact Key Constant Constant
Attribute Based Encryption Non Constant Constant
Identity Based Encryption Constant Non constant
Compact Summation Key Encryption Constant Constant
In Table 1, shows comparisons between all the available schemes with proposed compact summation
key encryption. Predefined key hierarchy has different encryption & decryption keys. Compact key have both
encryption & decryption keys constant but those are single key no combination. Attribute based encryption have
both different keys. Identity based encryption have one key constant and another non constant key. In compact
summation key encryption both keys are constant less size.
III. Compact Summation Key Encryption
As there are various methods available for cloud security but they are lagging in storing keys &
managing files. These schemes cannot provide a much security as required by market. In this paper a new
approach called compact summation key (CSK) Encryption for storing and managing files is used. These
schemes overcome all the drawbacks of IBE, ABE, HKM, and CK.
In traditional cryptography, messages were kept secret, but that approach can’t be applied to modern
cryptographic systems. Main aim of this paper is to keep data more secure and enhance power of encryption &
decryption keys without increasing size of them.The design of basic scheme is inspired from the
collusion-resistant broadcast encryption scheme proposed by Bonehet al. [14]. Although their scheme
supports constant-size secret keys, every key only has the power for decrypting ciphertexts associated to a
particular index. From above requirements there is need to devise a new extract algorithm and the corresponding
encrypt algorithm.
This algorithm is divided into five polynomial time algorithms. Those are combined together to
enhance security capabilities & to provide high level of security. Those steps are as follows,
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 57 | Page
1) Step 1:
(1 ,n)SETUP  : InSETUP , itrandomly pics a bilinear group G of prime order p where p lies between
1
2 2p 
  . A generator g G and pZ  .Where pZ is another bilinear group to compute ig g G
 
for 1,2,3.., , 2,2i n n n  .Output of the parameter as 1 2 2{ , ,..., , ,..,g }n n nparam g g g g  where param is group of
small bilinear classes. Note that each ciphertext class is represented by an index in integer set{1, 2,..., }n ,where
n the maximum number of ciphertext classes &1
is security level parameter and the number of ciphertext
classes n (i.e.class index should be an integer bounded by1& i .
2) Step 2
( , )KeyGen pk msk : Picks R pZ  output the public and master secret key pair( ,msk )r
pk v g    where
pk public key is and msk is the master secret key& is generated secret keyv is vertices of tree generated.
3) Step 3
( , , )Encrypt pk i m : For a message Tm G and index {1,2,3...n}i , randomly picks R pt Z and compute the
ciphertext as 2h
where T is index for G bilinear group of prime numbers & 2h
is generated Keys height as in
hierarchical key assignment scheme where h can be incremented as 16, 18, and 20.
4) Step 4
( , )Extract msk s : For the set S of indices 'j s the summation key is computed as
1 2,s n
j s
k g j c

 
SinceS does not include 0 , can always be retrieved from param where sK is extracted key which is
summation key generated from cipher index classes & from group of bilinear group G .
5) Step 5
1 2 3( , , , { , , })sDecrypt k s i C c c c : Ifi s . {1,2,3...n}i  Otherwise, return the message:
3 1 1 1 2
,
( , ) / ( , )s n j i s n j i
j S j i j S
m c e k g c e k g c
 
     
  
    
Forthe data owner, with the knowledge of ,term 1(g ,g )t
ne

can be easily recovered by
1 1,(c ,g ) (g ,g ) (g g )t t
n n ne e e 
  
  , where m is message which is converted to original form sK i.e. summation key
can be removed from message.
IV. Experimental Results
CASE I: File Compression Ratios
When files encrypted,file size can be changed dramatically, to check this BSdiff, Xdelta tools are used.
These are the file compression tools that can be used to compress files. These results of file size can be
compared with CSK scheme. As one of the feature of CSK scheme is file compression.Xdelta is a command line
program for delta encoding, which generates two file differences. This is similar to diff and patch, but it is
targeted for binary files and does not generate human readable output. The differences are recorded in discrete
files called "deltas" or "diffs". In situations where differences are small for ex, the change of a few words in a
large document or the change of a few records in a large table delta encoding greatly reduces data redundancy.
Collections of unique deltas are substantially more space-efficient than their non-encoded equivalents.
In table 2 comparison of compression ratios of files are described with CSK scheme. In which
summation key algorithm compress file size at large amount as compared with XDelta & BSDiff file
compression tools. These tools specifically used for storing data on server. So CSK takes small space so data
owner can put more files on cloud storage. This is shown graphically in Fig 4 CSK is at very high level in
compression.
Table 2: File Comparison Ratios
File Name File Size in KB(original) XDelta BSDiff CSK
File 1 1197 616 464 57
File 2 399 240 214 46
File 3 362 211 197 42
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 58 | Page
File 4 296 176 173 39
File 5 293 174 171 38
File 6 260 164 160 36
File 7 91 76 71 17
File 8 15 10 9 8
Figure 4File Comparison Ratios
CASE II: Comparative Execution Time
Table 3 shows comparative execution time of various popular schemes with CSK scheme in electronic
code book mode. In this table compact summation key required very less execution time to performing its
encryption task.
Fig5shows how CSK encrypt data in a very short duration as compared with hierarchical, attribute
based and compact key. As data size increases, execution time also increases.
Table 3: Execution Time in Different Schemes
Size in
Bytes
Cryptographic Methods
Hierarchical Attribute Based Identity Based Summation Key
20527 2 7 4 2
36002 4 13 6 3
45911 5 17 8 4
59852 7 23 11 6
69545 9 26 13 7
137325 17 51 26 13
158959 20 60 30 16
166364 21 62 31 17
191383 24 72 36 19
232398 30 87 44 24
Figure 5Execution Time in Different Cryptographic Methods
0
100
200
300
400
500
600
700
File 1 File 2 File 3 File 4 File 5 File 6 File 7 File 8
Size in bytes
File
Size
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
DOI: 10.9790/0661-17115359 www.iosrjournals.org 59 | Page
V. Conclusion
Protectuser’s data is a prime question in cloud storage. Cryptographic schemes are used frequently and
involve multiple keys for a single application this will lead to increase the size of keys. With compact
summation key encryption algorithmdata can be kept secure with compact sized summation key on cloud server.
This paper describes “summarization” of secret keys in public-key cryptosystems. This supports delegation of
secret keys for different ciphertext classes in cloud storage. No matter which one among the power set of
classes, the delegate can always get a summation key of constant size which is 16 bit in size. This scheme is
more flexible than hierarchical key assignment, IBE& ABE. CSK scheme not only saves spaces but also time,
required to generate keys. This is possible if & only if all key holders share a similar set of privileges.
Limitation in this work is the predefined bound of the number of maximum ciphertext classes. In cloud
storage, the number of cipher texts usually grows rapidly.So data owner has to reserve enough ciphertext classes
for the future extension. Otherwise, itneeds to expand the public-key as described in previous section. Although
the parameter can be downloaded with ciphertexts, it would be better if its size is independent of the maximum
number of ciphertext classes. On the other hand, when one carries the delegated keys in a mobile device without
using special trusted hardware, the key is prompt to leakage, designing a leakageresilient cryptosystem, yet
allows efficient andflexible key delegation is also an interesting direction.
References
[1]. S. G. Akl and P. D. Taylor, “Cryptographic Solution to a Problem of Access Control in a Hierarchy,” ACM Transactions on
ComputerSystems (TOCS), vol. 1, no. 3, pp. 239–248, 1983.
[2]. G. C. Chick and S. E. Tavares, “Flexible Access Control with Master Keys,” in Proceedings of Advances in Cryptology –
CRYPTO’89, ser. LNCS, vol. 435. Springer, 1989, pp. 316–322.
[3]. W.-G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Transactions on
Knowledge and Data Engineering (TKDE), vol. 14, no. 1, pp. 182–188, 2002.
[4]. G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci, “Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,”
J. Cryptology, vol. 25, no. 2, pp. 243–270, 2012.
[5]. R. S. Sandhu, “Cryptographic Implementation of a Tree Hierarchy for Access Control,” Information Processing Letters, vol. 27, no.
2, pp. 95–98, 1988
[6]. C.-K. Chu and W.-G.Tzeng, “Identity-Based Proxy Re-encryption Without Random Oracles,” in Information Security Conference
(ISC ’07), ser. LNCS, vol. 4779. Springer, 2007, pp. 189–202.
[7]. C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional Proxy Broadcast Re-Encryption,” in
AustralasianConference on Information Security and Privacy (ACISP ’09), ser.LNCS, vol. 5594. Springer, 2009, pp. 327–342.
[8]. S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology -
AFRICACRYPT 2010, ser. LNCS, vol. 6055.Springer, 2010, pp.316–332.
[9]. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure
Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006.
[10]. D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,”
inProceedings of Advances in Cryptology - CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258–275.
[11]. L. B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lopez, and R. Dahab, “TinyTate: Computing the Tate Pairing in
ResourceConstrained Sensor Nodes,” in Proceedings of 6th IEEE International Symposium on Network Computing and
Applications (NCA ’07).IEEE, 2007, pp. 318–323.
[12]. D. Naor, M. Naor, and J. Lotspiech, “Revocation and Tracing Schemes for Stateless Receivers,” in Proceedings of Advances in
Cryptology - CRYPTO ’01, ser. LNCS. Springer, 2001, pp. 41–62.
[13]. T. H. Yuen, S. S. M. Chow, Y. Zhang, and S. M. Yiu, “IdentityBased Encryption Resilient to Continual Auxiliary Leakage,” in
Proceedings of Advances in Cryptology - EUROCRYPT ’12, ser. LNCS, vol. 7237, 2012, pp. 117–134.
[14]. D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,” in Proceedings of
Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494.Springer, 2005, pp. 440–456.
[15]. D. Boneh, R. Canetti, S. Halevi, and J. Katz, “Chosen-Ciphertext Security from Identity-Based Encryption,” SIAM Journal on
Computing (SIAMCOMP), vol. 36, no. 5, pp. 1301–1328, 2007.

More Related Content

What's hot

SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paperIOSR Journals
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...TELKOMNIKA JOURNAL
 

What's hot (19)

C0281010016
C0281010016C0281010016
C0281010016
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
82 86
82 8682 86
82 86
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 

Viewers also liked

Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...IOSR Journals
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyIOSR Journals
 
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...IOSR Journals
 
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...IOSR Journals
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...IOSR Journals
 
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsIOSR Journals
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images IOSR Journals
 
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1DNumerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1DIOSR Journals
 
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...IOSR Journals
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...IOSR Journals
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...IOSR Journals
 
Design and Analysis of Image as A Street Light
Design and Analysis of Image as A Street LightDesign and Analysis of Image as A Street Light
Design and Analysis of Image as A Street LightIOSR Journals
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersIOSR Journals
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)IOSR Journals
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...IOSR Journals
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...IOSR Journals
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterIOSR Journals
 

Viewers also liked (20)

Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
Experimental Analysis on Performance Improvement of Diesel Engine Utilizing A...
 
Microcontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM TechnologyMicrocontroller-Based Metal Detection System with GSM Technology
Microcontroller-Based Metal Detection System with GSM Technology
 
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
 
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
 
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated LoadsClosed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
 
Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images Literature Survey on Detection of Brain Tumor from MRI Images
Literature Survey on Detection of Brain Tumor from MRI Images
 
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1DNumerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
 
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
 
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
Design, Modeling and Analysis of Linear Switched Reluctance Motor for Ground ...
 
Design and Analysis of Image as A Street Light
Design and Analysis of Image as A Street LightDesign and Analysis of Image as A Street Light
Design and Analysis of Image as A Street Light
 
Investigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice CoolersInvestigation of Thermal Insulation on Ice Coolers
Investigation of Thermal Insulation on Ice Coolers
 
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
 
New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...New Approach for Determination of Propagation Model Adapted To an Environment...
New Approach for Determination of Propagation Model Adapted To an Environment...
 
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...Determination ofRadiological Quality Parameters Using Optical Densitometer an...
Determination ofRadiological Quality Parameters Using Optical Densitometer an...
 
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC ConverterModelling of PV Array with MPP Tracking & Boost DC-DC Converter
Modelling of PV Array with MPP Tracking & Boost DC-DC Converter
 

Similar to Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage

Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 

Similar to Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage (20)

Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
262 265
262 265262 265
262 265
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 53-59 www.iosrjournals.org DOI: 10.9790/0661-17115359 www.iosrjournals.org 53 | Page Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage Pratap M Mohite, DipaDharmadhikari,RavindraBankar (Computer Science &Engineering,Marathwada Institute of Technology, India) (Computer Science &Engineering,Marathwada Institute of Technology, India) (Master of Computer Applications,Dr.BAMU, India) Abstract: Data security is crucial aspect in cloud storage. Providing security to a single file or to set of files is another important factor. In cloud, security is applied to a set of files i.e. to central location. In file sharing approach a single key can be used to gain access to storage. Applying security to each file in cloud is not possible with cloud environment. To solve this type ofproblems, new improved key assignment scheme have to be used. New improved algorithm that satisfies these conditions is summation key encryption. Summation key is of power more than two keys. It takes one public key, known to both parties & another key is generated using keygen algorithm. Data owner retrieves the summation key from the alternatives made to share data. This key can be dispatch to second user using secure channel for example email or smart cards. Summation key is compact in size & also decrease the size of files after encryption. Time duration required to generate summation key is very short as compare to Identity based or Attribute based encryption scheme.Practically how this algorithm is beneficial to provide security to individual files in cloud repositoryis described here. Keywords: Cloud Server,Data Sharing, Data Security, Hybrid Cloud, Summation key. I. Introduction Cloud system provides data sharing capabilities;this can provide an abundant of benefits to the users. There is currently a push for information technology industries to increase their data sharing efforts. In information technology industry there is tremendous increase in data outsourcing. Data can be outsourced or infrastructure can be shared or software can be used. Cloud services divide into three categories infrastructure as a service, platform as a service & software as a service. Infrastructure as a service is provision model in which on organization outsourced the equipment used to support operations including storage, hardware, servers & networking components. Platform as a service is a way of rent hardware, operating system storage & network capacity over the internet. Software as a service is a software distribution model in which applications are hosted by a vendors or service provider & made available to customers over network typically the internet. Data privacy isa traditional way to shield access control mechanism after conventional authentication. Any unauthorized person can procure access & reveal all data. Sharing data over cloud encounters some security related problems. Files shared from different clients can be hosted on different virtual machines for example virtualization in Linux, but whole data is stored on single machine. Data in target virtual machine could be stolen by instantiation another virtual machine co-resistance with victim machine. Multiple cryptographic schemes are used to store & check availability of files on behalf of data owner but can’t leak anything from that. But data owner can’t depend totally on cloud server due to lack of confidentiality. For this purpose data owner has to use some security policies to prevent unauthorized person to take data without permission of data owner. This will lead to manipulate some cryptographic methods while uploading data on cloud server. Principle term related to cloud is data sharing, but appraise the cloud computing environment propound without exposing mission critical applications and data to third party vulnerabilities. Data owner can use website or any application to share his private data with his friends. Consider D as a set of whole data & 1 2 3, ,d ,..., nd d d are data elements i.e. 1 2 3{ , , ,...,d }nD d d d Data owner desire to share only some data for ex: 1 2,d d with his friend .This sort of action cannot possible in cloud computing environment. Reason behind this, data owner has not specified 1 2,d d data separately; data is bunch of files. Using only one key data owner can gain access to data & he has to share that key also. His friend can see the whole dataset D. From Fig 1, Assume that Peter puts his personal data on cloud storage & he does not desire that his distinctive data will not be available to everyone. Due to much security violation possibilities he cannot totally relied on cloud storage. To prevent this, whole data D is stored on to cloud. But after some days his friend Anna Want some photos from dataset D. At this situation Peter has to give his secret key to decrypt D set. By using only one single key Anna can gain access to whole set of data D& she would be take another files from set. To prevent such situation Peter has to possible ways,
  • 2. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 54 | Page 1) Either apply a single key to whole dataset D , k(D) Or 2) Apply keys to each elements in dataset for ex, 1 2 3, ,d ,..., nd d d i.e. 1 1 2 2 3 3( ), ( ), (d )... ( )n nk d k d k k d Figure 1 Data Sharing inTraditional Cloud System First method is adverse because by using one single key Anna can obtain all data stored in cloud storage. In second method, applying each file a key can unbearable because of number of keys are as many as the number of files, say thousands. Transferring such keys requires a reliable storage the values & complication involved generally grow with the number of decryption keys to be shared. Encryption keys also come with two flavors symmetric key encryption& asymmetric key encryption.In symmetric key encryption scheme, Anna &Peter share a single common key to perform encryption & decryption operations. In asymmetric key scheme, Anna & Peter have different encryption and decryption keys. Flexibility is main application of public key encryption. For example in organization, every member can upload encrypted data on the cloud server without the knowledge of master secret key. Therefore the best solution for above problem is that Peter encrypts all files with unique public keys, but only sends Anna a single decryption key which is constant in size that is called as summation key Fig 2. This key can be sent via a secure channel called email or a smart card or wireless sensor network. Basic aim of current system is to minimize hardware and communication cost as well as time duration of key generation. There are various cryptographic schemes; those can be used to apply security mechanism over cloud storage but some lack in size & some are in integrity. Those are demonstrated in next section. Figure 2 Data sharing in Cloud Storage Using Summation Key. II. Related work 1. Types of Cryptography 1.1 Predefined Hierarchical Scheme Predefined Hierarchical Schemes [1] aim to minimize the cost in storing and managing secret keys for general cryptographic use. Employing a tree structure a secrete key for a given arm can be used to procured the secret keys of its child nodes.Sandhu [2] proposed a technique to initiate a tree hierarchy of symmetric keys by
  • 3. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 55 | Page using reiterated evaluations of pseudo random functions block cipher on stable secret. This notion can be verbalized from a tree to a graph.Another more advanced cryptographic key assignment schemes bears access policy that can be modelled by an acyclic graph [3].Most of these schemes construct keys for symmetric key cryptosystems, even though the key derivation may require modular arithmetic as used in public key cryptosystems, which are more expensive than” symmetric key operation” such as pseudorandom function[4]. Taking tree structure as an example, Peter can first classify the ciphertext classes according to their subjects like Fig 3. (a) (b) Figure 3 a) One Key for Hierarchy, b) Four Keys for Hierarchy Each node in the tree represents a secret key, while the leaf nodes represent the keys for individual ciphertext classes. Filled rectangles represent the keys for the classes to be delegated and circles circumvented by dotted lines represent the keys to be granted. Note that every key of the non-leaf node canderive the keys of its descendant nodes. In Fig 3(a), if Peter wants to share all the files in the “personal” category, he only needs to grant the keyfor the node “personal”, which automatically grants thedelegate the keys of all the descendant nodes (“photo”,“music”). This is the ideal case, where most classes tobe shared belong to the same branch and thus a parent key of them is sufficient. However, it is still difficult for general cases. As shown in Fig 3(b), if Peter shares his demomusic at work (“work”→“casual”→“demo” and“work”→“confidential”→“demo”) with a colleaguewho also has the rights to see some of her personaldata, what she can do is to give more keys, which leadsto an increase in the total key size. One can see thatthis approach is not flexible when the classificationshare more complex and she wants to share different setsof files to different people [5]. For this delegate in ourexample, the number of granted secret keys becomesthe same as the number of classes.In general, hierarchical approaches can solve the problem partially if one intends to share all files under a certain branch in the hierarchy. On average, the number ofkeys increases with the number of branches. It is unlikelyto come up with a hierarchy that can save the numberof total keys to be granted for all individuals (which canaccess a different set of leaf-nodes) simultaneously [6]. 1.2 Attribute-based encryption Attribute is analogues with cipher text. Data owner with master secret key can obtain a secrete key for the policy of attributes so that a ciphertext can be decrypted by this key if its associated attributes conforms to policy. Each attribute is associated with data this leads to increase in size of keys. For example with the secret key for the policy (2V3V6V8), one can decrypt ciphertext tagged with class 2, 3, 6 or 8 [7].The measure perturbed in attribute based encryption is collusion-resistance but not the compactness of secret keys. Actually, the size of the key often increases linearly with the number of attributes it encompasses, or the ciphertext-size is not immutable. To delegate the decryption power of some ciphertexts without sending the secret key to the delegate, a useful primitive is proxy re-encryption (PRE) [8]
  • 4. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 56 | Page A PRE permits peter to delegate tothe server (proxy) the ability to transform the ciphertexts encrypted under her public-key into ones for. PRE is well known to have innumerable applications including cryptographic file system. Nevertheless, Anna has to trustworthy the proxy that it only turns ciphertexts according to her instruction, which is what user wants to avoid at the first place [9]. Even worse, if the proxy colludes with, some form of Anna’s secret key can be recovered which can decrypt Anna’s (convertible) ciphertexts without Peter’s further help. That also means that the transformation key of proxy should be well protected Using PRE just moves the secure key storage requirement from the delegate to the proxy. It is thus undesirable to let the proxy reside in the storage server. That will also be inconvenient since every decryption requires separate interaction with the proxy. 1.3 Identity Based Encryption Identity-based encryption (IBE) is a type of public-key encryption in which the public-key of a user can be assign as an identity-string of the user (e.g. an email address). There is a trusted party called private key generator (PKG) in IBE which holds a master-secret key and issues a confidential key to each user concerning to the user identity. The encrypt or can take the public parameter and a user singularity to encrypt a message. The recipient can decrypt this ciphertext by his secret key [10]. Guoetet al, tried to build IBE with key aggregation. One of their schemes assumes random oracles but another does not. In their schemes, key aggregation is constrained in the sense that all keys to be summarize must come from different “identity divisions” [11]. While there are an exponential number of identities and thus secret keys, only a polynomial number of them can be summarize. Most importantly, their key-aggregation [12], comes at the expense of ( )O n sizes for both ciphertexts and the public parameter, where nis the number of secret keys which can be summation into a constant size one. This substantiallygrows the costs of storing and transmitting ciphertexts, which is inappropriate in many cases such as shared cloud storage. As mentioned, in this scheme, feature constant ciphertext size, and their security holds in the standard model. In fuzzy IBE [13], one single compact secret key can decrypt ciphertexts encrypted under many identities which are close in a certain metric space, but not for an arbitrary set of identities and therefore it does not match with our idea of key aggregation. Table 1: key Assignment Schemes Scheme Name Decryption Key Encryption Key Predefined key hierarchy Not Constant Constant Compact Key Constant Constant Attribute Based Encryption Non Constant Constant Identity Based Encryption Constant Non constant Compact Summation Key Encryption Constant Constant In Table 1, shows comparisons between all the available schemes with proposed compact summation key encryption. Predefined key hierarchy has different encryption & decryption keys. Compact key have both encryption & decryption keys constant but those are single key no combination. Attribute based encryption have both different keys. Identity based encryption have one key constant and another non constant key. In compact summation key encryption both keys are constant less size. III. Compact Summation Key Encryption As there are various methods available for cloud security but they are lagging in storing keys & managing files. These schemes cannot provide a much security as required by market. In this paper a new approach called compact summation key (CSK) Encryption for storing and managing files is used. These schemes overcome all the drawbacks of IBE, ABE, HKM, and CK. In traditional cryptography, messages were kept secret, but that approach can’t be applied to modern cryptographic systems. Main aim of this paper is to keep data more secure and enhance power of encryption & decryption keys without increasing size of them.The design of basic scheme is inspired from the collusion-resistant broadcast encryption scheme proposed by Bonehet al. [14]. Although their scheme supports constant-size secret keys, every key only has the power for decrypting ciphertexts associated to a particular index. From above requirements there is need to devise a new extract algorithm and the corresponding encrypt algorithm. This algorithm is divided into five polynomial time algorithms. Those are combined together to enhance security capabilities & to provide high level of security. Those steps are as follows,
  • 5. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 57 | Page 1) Step 1: (1 ,n)SETUP  : InSETUP , itrandomly pics a bilinear group G of prime order p where p lies between 1 2 2p    . A generator g G and pZ  .Where pZ is another bilinear group to compute ig g G   for 1,2,3.., , 2,2i n n n  .Output of the parameter as 1 2 2{ , ,..., , ,..,g }n n nparam g g g g  where param is group of small bilinear classes. Note that each ciphertext class is represented by an index in integer set{1, 2,..., }n ,where n the maximum number of ciphertext classes &1 is security level parameter and the number of ciphertext classes n (i.e.class index should be an integer bounded by1& i . 2) Step 2 ( , )KeyGen pk msk : Picks R pZ  output the public and master secret key pair( ,msk )r pk v g    where pk public key is and msk is the master secret key& is generated secret keyv is vertices of tree generated. 3) Step 3 ( , , )Encrypt pk i m : For a message Tm G and index {1,2,3...n}i , randomly picks R pt Z and compute the ciphertext as 2h where T is index for G bilinear group of prime numbers & 2h is generated Keys height as in hierarchical key assignment scheme where h can be incremented as 16, 18, and 20. 4) Step 4 ( , )Extract msk s : For the set S of indices 'j s the summation key is computed as 1 2,s n j s k g j c    SinceS does not include 0 , can always be retrieved from param where sK is extracted key which is summation key generated from cipher index classes & from group of bilinear group G . 5) Step 5 1 2 3( , , , { , , })sDecrypt k s i C c c c : Ifi s . {1,2,3...n}i  Otherwise, return the message: 3 1 1 1 2 , ( , ) / ( , )s n j i s n j i j S j i j S m c e k g c e k g c                 Forthe data owner, with the knowledge of ,term 1(g ,g )t ne  can be easily recovered by 1 1,(c ,g ) (g ,g ) (g g )t t n n ne e e       , where m is message which is converted to original form sK i.e. summation key can be removed from message. IV. Experimental Results CASE I: File Compression Ratios When files encrypted,file size can be changed dramatically, to check this BSdiff, Xdelta tools are used. These are the file compression tools that can be used to compress files. These results of file size can be compared with CSK scheme. As one of the feature of CSK scheme is file compression.Xdelta is a command line program for delta encoding, which generates two file differences. This is similar to diff and patch, but it is targeted for binary files and does not generate human readable output. The differences are recorded in discrete files called "deltas" or "diffs". In situations where differences are small for ex, the change of a few words in a large document or the change of a few records in a large table delta encoding greatly reduces data redundancy. Collections of unique deltas are substantially more space-efficient than their non-encoded equivalents. In table 2 comparison of compression ratios of files are described with CSK scheme. In which summation key algorithm compress file size at large amount as compared with XDelta & BSDiff file compression tools. These tools specifically used for storing data on server. So CSK takes small space so data owner can put more files on cloud storage. This is shown graphically in Fig 4 CSK is at very high level in compression. Table 2: File Comparison Ratios File Name File Size in KB(original) XDelta BSDiff CSK File 1 1197 616 464 57 File 2 399 240 214 46 File 3 362 211 197 42
  • 6. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 58 | Page File 4 296 176 173 39 File 5 293 174 171 38 File 6 260 164 160 36 File 7 91 76 71 17 File 8 15 10 9 8 Figure 4File Comparison Ratios CASE II: Comparative Execution Time Table 3 shows comparative execution time of various popular schemes with CSK scheme in electronic code book mode. In this table compact summation key required very less execution time to performing its encryption task. Fig5shows how CSK encrypt data in a very short duration as compared with hierarchical, attribute based and compact key. As data size increases, execution time also increases. Table 3: Execution Time in Different Schemes Size in Bytes Cryptographic Methods Hierarchical Attribute Based Identity Based Summation Key 20527 2 7 4 2 36002 4 13 6 3 45911 5 17 8 4 59852 7 23 11 6 69545 9 26 13 7 137325 17 51 26 13 158959 20 60 30 16 166364 21 62 31 17 191383 24 72 36 19 232398 30 87 44 24 Figure 5Execution Time in Different Cryptographic Methods 0 100 200 300 400 500 600 700 File 1 File 2 File 3 File 4 File 5 File 6 File 7 File 8 Size in bytes File Size
  • 7. Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage DOI: 10.9790/0661-17115359 www.iosrjournals.org 59 | Page V. Conclusion Protectuser’s data is a prime question in cloud storage. Cryptographic schemes are used frequently and involve multiple keys for a single application this will lead to increase the size of keys. With compact summation key encryption algorithmdata can be kept secure with compact sized summation key on cloud server. This paper describes “summarization” of secret keys in public-key cryptosystems. This supports delegation of secret keys for different ciphertext classes in cloud storage. No matter which one among the power set of classes, the delegate can always get a summation key of constant size which is 16 bit in size. This scheme is more flexible than hierarchical key assignment, IBE& ABE. CSK scheme not only saves spaces but also time, required to generate keys. This is possible if & only if all key holders share a similar set of privileges. Limitation in this work is the predefined bound of the number of maximum ciphertext classes. In cloud storage, the number of cipher texts usually grows rapidly.So data owner has to reserve enough ciphertext classes for the future extension. Otherwise, itneeds to expand the public-key as described in previous section. Although the parameter can be downloaded with ciphertexts, it would be better if its size is independent of the maximum number of ciphertext classes. On the other hand, when one carries the delegated keys in a mobile device without using special trusted hardware, the key is prompt to leakage, designing a leakageresilient cryptosystem, yet allows efficient andflexible key delegation is also an interesting direction. References [1]. S. G. Akl and P. D. Taylor, “Cryptographic Solution to a Problem of Access Control in a Hierarchy,” ACM Transactions on ComputerSystems (TOCS), vol. 1, no. 3, pp. 239–248, 1983. [2]. G. C. Chick and S. E. Tavares, “Flexible Access Control with Master Keys,” in Proceedings of Advances in Cryptology – CRYPTO’89, ser. LNCS, vol. 435. Springer, 1989, pp. 316–322. [3]. W.-G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 14, no. 1, pp. 182–188, 2002. [4]. G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci, “Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,” J. Cryptology, vol. 25, no. 2, pp. 243–270, 2012. [5]. R. S. Sandhu, “Cryptographic Implementation of a Tree Hierarchy for Access Control,” Information Processing Letters, vol. 27, no. 2, pp. 95–98, 1988 [6]. C.-K. Chu and W.-G.Tzeng, “Identity-Based Proxy Re-encryption Without Random Oracles,” in Information Security Conference (ISC ’07), ser. LNCS, vol. 4779. Springer, 2007, pp. 189–202. [7]. C.-K. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional Proxy Broadcast Re-Encryption,” in AustralasianConference on Information Security and Privacy (ACISP ’09), ser.LNCS, vol. 5594. Springer, 2009, pp. 327–342. [8]. S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology - AFRICACRYPT 2010, ser. LNCS, vol. 6055.Springer, 2010, pp.316–332. [9]. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1–30, 2006. [10]. D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,” inProceedings of Advances in Cryptology - CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258–275. [11]. L. B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lopez, and R. Dahab, “TinyTate: Computing the Tate Pairing in ResourceConstrained Sensor Nodes,” in Proceedings of 6th IEEE International Symposium on Network Computing and Applications (NCA ’07).IEEE, 2007, pp. 318–323. [12]. D. Naor, M. Naor, and J. Lotspiech, “Revocation and Tracing Schemes for Stateless Receivers,” in Proceedings of Advances in Cryptology - CRYPTO ’01, ser. LNCS. Springer, 2001, pp. 41–62. [13]. T. H. Yuen, S. S. M. Chow, Y. Zhang, and S. M. Yiu, “IdentityBased Encryption Resilient to Continual Auxiliary Leakage,” in Proceedings of Advances in Cryptology - EUROCRYPT ’12, ser. LNCS, vol. 7237, 2012, pp. 117–134. [14]. D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with Constant Size Ciphertext,” in Proceedings of Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494.Springer, 2005, pp. 440–456. [15]. D. Boneh, R. Canetti, S. Halevi, and J. Katz, “Chosen-Ciphertext Security from Identity-Based Encryption,” SIAM Journal on Computing (SIAMCOMP), vol. 36, no. 5, pp. 1301–1328, 2007.