SlideShare a Scribd company logo
1 of 10
Abstract Review
Key-Aggregate Cryptosystem for Scalable Data
Sharing in Cloud Storage
GUIDE:
SK.Khaja Shareef
Team Members: Asst.Professor
• Y.SAIKRISHNA (11H51A05C0)
• A.SATISH KUMAR (11H51A0564)
• C.GOVARDHAN (11H51A0572)
Abstract:
 Data sharing is an important functionality in cloud storage. In this project, we show
how to securely, efficiently, and flexibly share data with others in cloud storage.
We describe new public-key cryptosystems which produce constant-size (single
key) Ciphertexts such that efficient delegation of decryption rights for any set of
Ciphertexts are possible. The novelty is that one can aggregate any set of secret
keys and make them as compact as a single key, but encompassing the power of
all the keys being aggregated. In other words, the secret key holder can release a
constant-size aggregate key for flexible choices of ciphertext set in cloud storage,
but the other encrypted files outside the set remain confidential. This compact
aggregate key can be conveniently sent to security channels (e.g email) with
very limited secure storage
Current Scenario:
 Assume that Alice puts all her private files on Dropbox(cloud), and she does not want to
expose her files to everyone.
 Due to various data leakage possibility Alice cannot feel relieved by just relying on the
privacy protection mechanisms provided by Dropbox,
 Alice encrypts all the files using her own keys before uploading. One day, Alice’s friend,
Bob asks her to share the files taken over all these years which Bob appeared in.
 Alice can use the share function of Dropbox, but the problem now is how to delegate
the decryption rights for these files to Bob.
 A possible option Alice can choose is to securely send Bob the secret keys involved.
Disadvantages Of Current Scenario:
 In the current scenario there are two extreme ways under the traditional
encryption paradigm
 Alice encrypts all files with a single encryption key and gives Bob the
corresponding secret key directly.
 Alice encrypts files with distinct keys and sends Bob the corresponding
secret keys.
 Obviously, the first method is inadequate since all un-chosen data may be
also leaked to Bob. For the second method, there are practical concerns
on efficiency. The number of such keys is as many as the number of the
shared files, say, a thousand. Transferring these secret keys inherently
requires a secure channel, and storing these keys requires rather expensive
secure storage.
Proposed Solution:
 Current Scenario problem can be solved by introducing a special type of public-key
encryption which we call key-aggregate cryptosystem (KAC).
 KAC, users encrypt a message not only under a public-key, but also under an identifier
of ciphertext called class.
 The ciphertexts are further categorized into different classes.
 The key owner holds a master-secret called master-secret key, which can be used to
extract secret keys for different classes.
 The extracted key can be an aggregate key which is as compact as a secret key for a
single class, but aggregates the power of many such keys, i.e., the decryption power
for any subset of ciphertext classes.
Advantages Of Proposed Solution
 With our solution, Alice can simply send Bob a single aggregate key via a
secure e-mail. Bob can download the encrypted files from Alice’s Dropbox
space and then use this aggregate key to decrypt these encrypted files
SOFTWARE REQUIREMENTS:
•Operating system : Windows XP/7.
•Coding Language : C#.net
•Tool : Visual Studio 2010
•Database : SQL SERVER 2008
System Requirements:
MINIMUM HARDWARE REQUIREMENTS:
•System : Pentium IV 2.4 GHz.
•Hard Disk : 40 GB.
•Monitor : 15 VGA Colour.
•Mouse : Logitech.
•Ram : 512 Mb.
THANK YOU

More Related Content

What's hot

Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShakas Technologies
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storagechennaijp
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAbhijeet Patil
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption forShakas Technologies
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Vasanth Mca
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstractSenthilvel S
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionMano Sriram
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164Thivya Devaraj
 

What's hot (20)

Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstract
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 

Viewers also liked

Selma Funeral Home Monument Kiosk
Selma Funeral Home Monument KioskSelma Funeral Home Monument Kiosk
Selma Funeral Home Monument Kioskselmafuneralhome
 
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...Funeral Innovations
 
Top 10 funeral home interview questions and answers
Top 10 funeral home interview questions and answersTop 10 funeral home interview questions and answers
Top 10 funeral home interview questions and answersdaveedward373
 
Tesla : sales and distribution
Tesla : sales and distributionTesla : sales and distribution
Tesla : sales and distributionaseel m
 
Tesla Strategy
Tesla StrategyTesla Strategy
Tesla StrategyJoe Baker
 
Principles of business
Principles of businessPrinciples of business
Principles of businessleroy walker
 

Viewers also liked (9)

Selma Funeral Home Monument Kiosk
Selma Funeral Home Monument KioskSelma Funeral Home Monument Kiosk
Selma Funeral Home Monument Kiosk
 
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...
Pre-planning 2.0: How to Use Digital Marketing to Generate Leads for Your Fun...
 
Top 10 funeral home interview questions and answers
Top 10 funeral home interview questions and answersTop 10 funeral home interview questions and answers
Top 10 funeral home interview questions and answers
 
Tesla : sales and distribution
Tesla : sales and distributionTesla : sales and distribution
Tesla : sales and distribution
 
Tesla Strategy
Tesla StrategyTesla Strategy
Tesla Strategy
 
Tesla Motors Presentation
Tesla Motors PresentationTesla Motors Presentation
Tesla Motors Presentation
 
Tesla motors final presentation
Tesla motors final presentationTesla motors final presentation
Tesla motors final presentation
 
Tesla ppt
Tesla pptTesla ppt
Tesla ppt
 
Principles of business
Principles of businessPrinciples of business
Principles of business
 

Similar to key aggregate cryptosystem for scalable data sharing in cloud storage abstract

Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionvitam,berhampur
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...IEEEGLOBALSOFTTECHNOLOGIES
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
Attribute based storage supporting
Attribute based storage supporting Attribute based storage supporting
Attribute based storage supporting CloudTechnologies
 
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...CloudTechnologies
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computingVenkat Projects
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute basedcloudtechnologies42
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsVijay Karan
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsVijay Karan
 
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...CloudTechnologies
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxBrenoMeister
 

Similar to key aggregate cryptosystem for scalable data sharing in cloud storage abstract (20)

Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
 
Puzzle Lock
Puzzle LockPuzzle Lock
Puzzle Lock
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Attribute based storage supporting
Attribute based storage supporting Attribute based storage supporting
Attribute based storage supporting
 
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute based
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
 
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsx
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

key aggregate cryptosystem for scalable data sharing in cloud storage abstract

  • 2. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage GUIDE: SK.Khaja Shareef Team Members: Asst.Professor • Y.SAIKRISHNA (11H51A05C0) • A.SATISH KUMAR (11H51A0564) • C.GOVARDHAN (11H51A0572)
  • 3. Abstract:  Data sharing is an important functionality in cloud storage. In this project, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size (single key) Ciphertexts such that efficient delegation of decryption rights for any set of Ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to security channels (e.g email) with very limited secure storage
  • 4. Current Scenario:  Assume that Alice puts all her private files on Dropbox(cloud), and she does not want to expose her files to everyone.  Due to various data leakage possibility Alice cannot feel relieved by just relying on the privacy protection mechanisms provided by Dropbox,  Alice encrypts all the files using her own keys before uploading. One day, Alice’s friend, Bob asks her to share the files taken over all these years which Bob appeared in.  Alice can use the share function of Dropbox, but the problem now is how to delegate the decryption rights for these files to Bob.  A possible option Alice can choose is to securely send Bob the secret keys involved.
  • 5. Disadvantages Of Current Scenario:  In the current scenario there are two extreme ways under the traditional encryption paradigm  Alice encrypts all files with a single encryption key and gives Bob the corresponding secret key directly.  Alice encrypts files with distinct keys and sends Bob the corresponding secret keys.  Obviously, the first method is inadequate since all un-chosen data may be also leaked to Bob. For the second method, there are practical concerns on efficiency. The number of such keys is as many as the number of the shared files, say, a thousand. Transferring these secret keys inherently requires a secure channel, and storing these keys requires rather expensive secure storage.
  • 6. Proposed Solution:  Current Scenario problem can be solved by introducing a special type of public-key encryption which we call key-aggregate cryptosystem (KAC).  KAC, users encrypt a message not only under a public-key, but also under an identifier of ciphertext called class.  The ciphertexts are further categorized into different classes.  The key owner holds a master-secret called master-secret key, which can be used to extract secret keys for different classes.  The extracted key can be an aggregate key which is as compact as a secret key for a single class, but aggregates the power of many such keys, i.e., the decryption power for any subset of ciphertext classes.
  • 7. Advantages Of Proposed Solution  With our solution, Alice can simply send Bob a single aggregate key via a secure e-mail. Bob can download the encrypted files from Alice’s Dropbox space and then use this aggregate key to decrypt these encrypted files
  • 8. SOFTWARE REQUIREMENTS: •Operating system : Windows XP/7. •Coding Language : C#.net •Tool : Visual Studio 2010 •Database : SQL SERVER 2008 System Requirements:
  • 9. MINIMUM HARDWARE REQUIREMENTS: •System : Pentium IV 2.4 GHz. •Hard Disk : 40 GB. •Monitor : 15 VGA Colour. •Mouse : Logitech. •Ram : 512 Mb.