SlideShare a Scribd company logo
Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud
Storage
INTRODUCTION
 Cloud computing provides the flexible architecture to share the
application(software) as well as the other network
resources(hardware)
 Cloud storage enables networked online storage where data is
stored on multiple virtual servers, generally hosted by third
parties , rather than being hosted on dedicated servers
 Key management and key sharing plays the main role in the data
sharing concept of cloud computing
 Traditional key cryptosystems lack the enhanced security
techniques as the keys are generated by the existing random key
generation
 Proposed system said to have aggregate key cryptosystem in
which key generated by means of various derivations of cipher
text class properties of data and its associated keys
DISADVANTAGES OF EXISTING SYSTEM
 Unexpected privilege escalation will expose all
 It is not efficient
 Shared data will not be secure
 The costs and complexities involved generally increase with
the number of the decryption keys to be shared
 The encryption key and decryption key are different in public
key encryption
ADVANTAGES OF PROPOSED SYSTEM
 It is more secure
 Decryption key is sent via a secure channel and kept secret
 It is an efficient public-key encryption scheme which supports
flexible delegation
 The extracted key have can be an aggregate key which is as
compact as a secret key for a single class
 The delegation of decryption can be efficiently implemented with
the aggregate key
KEY-AGGREGATE ENCRYPTION
 A key aggregate encryption has five polynomial-time
algorithms
 Setup Phase
 KeyGen Phase
 Encrypt Phase
 Extract Phase
 Decrypt Phase
SETUP PHASE
 The data owner executes the setup phase for an account on
server which is not trusted
 The setup algorithm only takes implicit security parameter
KeyGen Phase
 This phase is executed by data owner to generate the public or
the master key pair (pk, msk)
Encrypt Phase
 This phase is executed by anyone who wants to send the
encrypted data
 Encrypt (pk, m, i), the encryption algorithm takes input as
public parameters pk, a message m, and i denoting ciphertext
class
 The algorithm encrypts message m and produces a ciphertext C
such that only a user that has a set of attributes that satisfies the
access structure is able to decrypt the message
 Input= public key pk, an index i, and message m
 Output = ciphertext C
Extract Phase
 This is executed by the data owner for delegating the
decrypting power for a certain set of ciphertext classes to a
delegate
 Input = master-secret key mk and a set S of indices
corresponding to different classes
 Outputs = aggregate key for set S denoted by kS
Decrypt Phase
 This is executed by the candidate who has the decryption
authorities. Decrypt (kS, S, i, C), the decryption algorithm
takes input as public parameters pk, a ciphertext C, i denoting
ciphertext classes for a set S of attributes
 Input = kS and the set S, where index i = ciphertext class
 Outputs = m if i element of S
Conclusion
 To share data flexibly is vital thing in cloud computing
 Users prefer to upload there data on cloud and among different users
 Outsourcing of data to server may lead to leak the private data of user
to everyone
 Encryption is a one solution which provides to share selected data with
desired candidate
 Sharing of decryption keys in secure way plays important role
 Public-key cryptosystems provides delegation of secret keys for
different ciphertext classes in cloud storage
 The delegatee gets securely an aggregate key of constant size
 It is required to keep enough number of cipher texts classes as they
increase fast and the ciphertext classes are bounded that is the
limitation
Key aggregate cryptosystem for scalable data sharing in cloud storage

More Related Content

What's hot

Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 

What's hot (20)

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Cryptographic protocols
Cryptographic protocolsCryptographic protocols
Cryptographic protocols
 
Aes
AesAes
Aes
 
Cryptography
CryptographyCryptography
Cryptography
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
Steganography
SteganographySteganography
Steganography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
SSL
SSLSSL
SSL
 
Cryptography
CryptographyCryptography
Cryptography
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Kerberos
KerberosKerberos
Kerberos
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Kerberos
KerberosKerberos
Kerberos
 
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
 
secure socket layer
secure socket layersecure socket layer
secure socket layer
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 

Viewers also liked

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Sasi Kumar
 

Viewers also liked (12)

KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Peer to Peer Information Retrieval
Peer to Peer Information RetrievalPeer to Peer Information Retrieval
Peer to Peer Information Retrieval
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Key aggregate cryptosystem for scalable data sharing in cloud storage

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
Scott Payne
 

Similar to Key aggregate cryptosystem for scalable data sharing in cloud storage (20)

A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
Phase1
Phase1Phase1
Phase1
 
262 265
262 265262 265
262 265
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 

Key aggregate cryptosystem for scalable data sharing in cloud storage

  • 1. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  • 2. INTRODUCTION  Cloud computing provides the flexible architecture to share the application(software) as well as the other network resources(hardware)  Cloud storage enables networked online storage where data is stored on multiple virtual servers, generally hosted by third parties , rather than being hosted on dedicated servers  Key management and key sharing plays the main role in the data sharing concept of cloud computing
  • 3.  Traditional key cryptosystems lack the enhanced security techniques as the keys are generated by the existing random key generation  Proposed system said to have aggregate key cryptosystem in which key generated by means of various derivations of cipher text class properties of data and its associated keys
  • 4. DISADVANTAGES OF EXISTING SYSTEM  Unexpected privilege escalation will expose all  It is not efficient  Shared data will not be secure  The costs and complexities involved generally increase with the number of the decryption keys to be shared  The encryption key and decryption key are different in public key encryption
  • 5. ADVANTAGES OF PROPOSED SYSTEM  It is more secure  Decryption key is sent via a secure channel and kept secret  It is an efficient public-key encryption scheme which supports flexible delegation  The extracted key have can be an aggregate key which is as compact as a secret key for a single class  The delegation of decryption can be efficiently implemented with the aggregate key
  • 6. KEY-AGGREGATE ENCRYPTION  A key aggregate encryption has five polynomial-time algorithms  Setup Phase  KeyGen Phase  Encrypt Phase  Extract Phase  Decrypt Phase
  • 7. SETUP PHASE  The data owner executes the setup phase for an account on server which is not trusted  The setup algorithm only takes implicit security parameter
  • 8. KeyGen Phase  This phase is executed by data owner to generate the public or the master key pair (pk, msk)
  • 9. Encrypt Phase  This phase is executed by anyone who wants to send the encrypted data  Encrypt (pk, m, i), the encryption algorithm takes input as public parameters pk, a message m, and i denoting ciphertext class  The algorithm encrypts message m and produces a ciphertext C such that only a user that has a set of attributes that satisfies the access structure is able to decrypt the message  Input= public key pk, an index i, and message m  Output = ciphertext C
  • 10. Extract Phase  This is executed by the data owner for delegating the decrypting power for a certain set of ciphertext classes to a delegate  Input = master-secret key mk and a set S of indices corresponding to different classes  Outputs = aggregate key for set S denoted by kS
  • 11. Decrypt Phase  This is executed by the candidate who has the decryption authorities. Decrypt (kS, S, i, C), the decryption algorithm takes input as public parameters pk, a ciphertext C, i denoting ciphertext classes for a set S of attributes  Input = kS and the set S, where index i = ciphertext class  Outputs = m if i element of S
  • 12. Conclusion  To share data flexibly is vital thing in cloud computing  Users prefer to upload there data on cloud and among different users  Outsourcing of data to server may lead to leak the private data of user to everyone  Encryption is a one solution which provides to share selected data with desired candidate  Sharing of decryption keys in secure way plays important role  Public-key cryptosystems provides delegation of secret keys for different ciphertext classes in cloud storage  The delegatee gets securely an aggregate key of constant size  It is required to keep enough number of cipher texts classes as they increase fast and the ciphertext classes are bounded that is the limitation