SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 69
A Review on Key-Aggregate Cryptosystem for
Climbable Knowledge Sharing in Cloud Storage
Priyanka Kale
Department of Computer Science And Engineering
BIT, Ballarpur, India
Mrunali Vaidya
Department of Computer Science And Engineering
BIT, Ballarpur, India
Abstract: The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Keywords: Cloud storage, data sharing, key-aggregate cryptosystem, Identity encryption, Attribute encryption, cryptosystem.
1.INTRODUCTION
Cloud computing is widely increasing technology; data can be
saved on cloud remotely and can have access to huge
applications with quality services which are shared among
customers. As increase in outsourcing of data the cloud
computing serves does the management of data [1].Its flexible
and cost optimizing characteristic motivates the end user as
well as enterprises to store the data on cloud. The insider
attack is one of security concern which’s needs to be focused.
Cloud Service provider need to make sure whether audits are
held for users who have physical access to the server. As
cloud service provider stores the data of different users on
same server it is possible that user’s private data is leaked to
others. The public auditing system of data storage security in
cloud computing provides a privacy-preserving auditing
protocol [2].
It is necessary to make sure that the data integrity without
compromising the anonymity of the data user. To ensure the
integrity the user can verify metadata on their data, upload
and verify metadata [3].The main concern is how to share the
data securely the answer is cryptography. The question is
how can the encrypted data is to be shared. The user must
provide the access rights to the other user as the data is
encrypted and the decryption key should be send securely. For
an example Alice keeps her private data i.e. photos on
dropbox and she doesn’t want to share it with everyone. As
the attacker may access the data so it is not possible to rely on
predefine privacy preserving mechanism so she all the
photos were encrypted by her on encryption key while
uploading it.
2.LITERATURE SURVEY
Cloud computing is visualized as architecture for succeeding
generation. It has many facilities though have a risk of
attacker who can access the data or leak the users identity.
While setting a cloud users and service providers
authentication is necessary. The issue arises whether loud
service provider or user is not compromised. The data will
leak if any one of them in compromised. The cloud should be
simple, preserving the privacy and also maintaining users
identity [1]
The flexible use of cloud storage for user is a need as it is
seams accessing data locally though that is present at remote
side. It is important to inspect the data set on the cloud. So it
is necessary to allow a public audit for integrity of outsourced
data through third party auditor (TPA). TPA is also beneficial
for cloud service provider. It checks the correctness of the
outsourced data. TPA should be able to do public audit ability,
storage correctness, privacy preserving, Batch auditing with
minimum communication and computation overhead[2].
There are many cloud users who wants to upload there data
without providing much personal details to other users. The
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 70
anonymity of the user is to be preserved so that not to reveal
the identity of data owner. Provable data possession (PDP)
uses similar demonst rating marks to reduce computation on
server, and network traffic. PDA ensures the data present on
cloud which is un-trusted is original without accessing it.
Security mediator (SEM) is approach allows the user to
preserve the anonymity. Users are meant to upload all their
data to SEM so that the SEM is not able to understand the
data although it’s going to generate the verification on data.
As the users are signed at SEM it should not know the identity
of up loader [3].
3.WORKING
Fig .Data flow Diagram
Above figure shows how data flows between user and
receiver. Firstly user registration for login with valid
username and password then ID key generation and identity
key authentication when the verify both key then secrete key
authentication verification it goes to Attribute based
encryption specification/verification of user this user valid for
login or not. If user valid for login then documents handling
of user, and user not valid then found error for document
handling.
4 TYPEOF ENCRYPTION TECHNIQUES
4.1 Key-Aggregate Cryptosystem
New public-key cryptosystems which produce constant-size
cipher texts such that efficient delegation of decryption rights
for any set of cipher texts are possible. The novelty is that one
can aggregate any set of secret keys and make them as
compact as a single key, but encompassing the power of all
the keys being aggregated. In other words, the secret key
holder can release a constant-size aggregate key for flexible
choices of cipher text set in cloud storage, but the other
encrypted files outside the set remain confidential.
A key-aggregate encryption system basically includes five
algorithmic steps as follows- The data owner establishes the
public system parameter by using Setup and generates a
public/master-secret key pair by using KeyGen. Messages
can be encrypted using Encrypt by anyone who also decides
what ciphertext class is associated with the plaintext message
to be encrypted. The data owner can use the master-secret to
generate an aggregate decryption key for a set of ciphertext
classes by Extract. The generated keys can be passed to
Receivers securely via secure e-mails. Finally, any user with
an aggregate key can decrypt any ciphertext provided that the
ciphertext’s class is contained in the aggregate key via
Decrypt.
a) Setup Phase
The data owner executes the setup phase for an account
onserver which is not trusted. The setup algorithm only Take
simplicit security parameter.
b)KeyGen Phase
This phase is executed by data owner to generate the public or
the master key pair (pk, msk).
c) Encrypt Phase
This phase is executed by anyone who wants to send the
encrypted data. Encrypt (pk, m, i), the encryption algorithm
takes input as public parameters pk, a message m, and I
denoting cipher text class. The algorithm encrypts message m
and produces a cipher text C such that only a user that has a
set of attributes that satisfies the access structure is able to
decrypt the message.
d) Cloud Storage
Cloud storage is nowadays very popular storage
system. Cloud storage is storing of data off- site to
the physical storage which is maintained by third
party. Cloud storage is saving of digital data in
logical pool and physical storage spans multiple
servers which are manage by third party. Third
party is responsible for keeping data available and
accessible and physical environment should be
protected and running at all time. Instead of storing
data to the hard drive or any other local storage, we
save data to remote storage which is accessible from
anywhere and anytime. It reduces efforts of carrying
physical storage to everywhere. By using cloud
storage we can access information from any
computer through internet which omitted limitation
of accessing information from same computer
where it is stored. While considering data privacy,
we cannot rely on traditional technique of
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 71
authentication, because unexpected privilege
escalation will expose all data. Solution is to
encrypt data before uploading to the server with
user’s own key. Data sharing is again important
functionality of cloud storage, because user can
share data from anywhere and anytime to anyone.
For example, organization may grant permission to
access part of sensitive data to their employees. But
challenging task is that how to share encrypted data.
Traditional way is user can download the encrypted
data from storage, decrypt that data and send it to
share with others, but it loses the importance of
cloud storage.
4.2 Identity encryption techniques
 System will automatically generate identity string
of every user using set of different system generated
algorithms
 Identity based encryption is a type of public key
encryption in which public-key of a user can be set
as an identity-string of the user
 At the time of registration every user will get his/her
identity key on email
 While uploading and downloading documents on
cloud, every user have to prove his/her identity
using identity key.
4.3Attribute based encryption
technique
 In this application we propose attribute based
encryption technique for documents encryption
 When user wants to upload any document for
particular set of users, he/she have to specify
permissions in attribute format
 ABE enhances the security of system and prevent
documents from leakage when attacker knows
secrete key
 In order to prevent key escrow and cipher text
enlargement problem we propose xml documents to
store users attributes
 System will automatically create one xml doc for
every user to specify his documents access
attributes
 The xml document will be stored in encrypted
format on server.
5. CONCLUSIONS
To share data flexibly is vital thing in cloud computing. Users
prefer to upload there data on cloud and among different
users. Outsourcing of data to server may lead to leak the
private data of user to everyone. Encryption is a on solution
which provides to share selected data with desired candidate.
Sharing of decryption keys in secure way plays important
role. Public-key cryptosystems provides delegation of secret
keys for different cipher text classes in cloud storage. The
delegate gets securely an aggregate key of constant size It is
required to keep enough number of cipher texts classes as they
increase fast and the cipher text classes are bounded that is the
limitation.
6.ACKNOWLEDGMENTS
I would like to extend my gratitude to many people who
helped me to bring this paper fruition. First I would like to
thank Prof. Mrunali Vaidya. I am so deeply grateful for her
help, professionalism, and valuable guidance throughout this
paper. I would also like to thank to my friends and colleague.
This accomplishment would not have been possible without
them. Thank you.
7.REFERENCES
[1].S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu,
“SPICE -Simple Privacy-Preserving Identity-Management for
Cloud Environment,”in Applied Cryptography and Network
Security –ACNS 2012, ser.LNCS, vol. 7341. Springer, 2012,
pp. 526–543.
[2].C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou,
“Privacy-Preserving Public Auditing for Secure Cloud
Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362–375,
2013.
[3].B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing
Shared Dataon the Cloud via Security-Mediator,” in
International Conference on Distributed Computing Systems -
ICDCS 2013. IEEE, 2013.
[4].Cheng Kang Chu, Sherman S.M. Chow, Wen-Guey
Tzeng, Jianying Zhou, and Robert H. Deng,,” Key Aggregate
Cryptosystem for
Scalable Data Sharing in Cloud Storage “,IEEE Transaction
on Parellel and Distributed System, vol. 25, no. 2, February
2014 .
[5]S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters,
“Practical Leakage-Resilient Identity-Based Encryption from
Simple Assumptions,” Proc. ACM Conf. Computer and
Comm. Security, pp. 152-161, 2010.
[6].S. Singh,”Different Cloud Computing Standards a Huge
Challenge”, The Economic times, 4 June 2009.
[7] .J. Urquhart, “The Biggest Cloud computingIssue of
2009is Trust”, C-NetNews, 7 Jan 2009
[8].D. Boneh and M. K. Franklin, “Identity
-Based Encryption from the Weil Pairing,” in Proceedings of
Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol.
2139. Springer, 2001, pp. 213–229.
[9]M. Chase and S. S. M. Chow,“Improving Privacy and
Security in Multi-Authority Attribute-Based Encryption,” in
International Journal of Science and Engineering Applications
Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 72
CM Conference on Computer and Communications Security,
2009, pp. 121 –130.

Mais conteúdo relacionado

Mais procurados

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 

Mais procurados (20)

Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 

Destaque

Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam
 

Destaque (8)

Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 

Semelhante a A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 

Semelhante a A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage (20)

Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Paper2
Paper2Paper2
Paper2
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
J017236366
J017236366J017236366
J017236366
 

Mais de Editor IJCATR

Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 

Mais de Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage

  • 1. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 69 A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Cloud Storage Priyanka Kale Department of Computer Science And Engineering BIT, Ballarpur, India Mrunali Vaidya Department of Computer Science And Engineering BIT, Ballarpur, India Abstract: The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible hierarchy, which was yet to be known. Keywords: Cloud storage, data sharing, key-aggregate cryptosystem, Identity encryption, Attribute encryption, cryptosystem. 1.INTRODUCTION Cloud computing is widely increasing technology; data can be saved on cloud remotely and can have access to huge applications with quality services which are shared among customers. As increase in outsourcing of data the cloud computing serves does the management of data [1].Its flexible and cost optimizing characteristic motivates the end user as well as enterprises to store the data on cloud. The insider attack is one of security concern which’s needs to be focused. Cloud Service provider need to make sure whether audits are held for users who have physical access to the server. As cloud service provider stores the data of different users on same server it is possible that user’s private data is leaked to others. The public auditing system of data storage security in cloud computing provides a privacy-preserving auditing protocol [2]. It is necessary to make sure that the data integrity without compromising the anonymity of the data user. To ensure the integrity the user can verify metadata on their data, upload and verify metadata [3].The main concern is how to share the data securely the answer is cryptography. The question is how can the encrypted data is to be shared. The user must provide the access rights to the other user as the data is encrypted and the decryption key should be send securely. For an example Alice keeps her private data i.e. photos on dropbox and she doesn’t want to share it with everyone. As the attacker may access the data so it is not possible to rely on predefine privacy preserving mechanism so she all the photos were encrypted by her on encryption key while uploading it. 2.LITERATURE SURVEY Cloud computing is visualized as architecture for succeeding generation. It has many facilities though have a risk of attacker who can access the data or leak the users identity. While setting a cloud users and service providers authentication is necessary. The issue arises whether loud service provider or user is not compromised. The data will leak if any one of them in compromised. The cloud should be simple, preserving the privacy and also maintaining users identity [1] The flexible use of cloud storage for user is a need as it is seams accessing data locally though that is present at remote side. It is important to inspect the data set on the cloud. So it is necessary to allow a public audit for integrity of outsourced data through third party auditor (TPA). TPA is also beneficial for cloud service provider. It checks the correctness of the outsourced data. TPA should be able to do public audit ability, storage correctness, privacy preserving, Batch auditing with minimum communication and computation overhead[2]. There are many cloud users who wants to upload there data without providing much personal details to other users. The
  • 2. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 70 anonymity of the user is to be preserved so that not to reveal the identity of data owner. Provable data possession (PDP) uses similar demonst rating marks to reduce computation on server, and network traffic. PDA ensures the data present on cloud which is un-trusted is original without accessing it. Security mediator (SEM) is approach allows the user to preserve the anonymity. Users are meant to upload all their data to SEM so that the SEM is not able to understand the data although it’s going to generate the verification on data. As the users are signed at SEM it should not know the identity of up loader [3]. 3.WORKING Fig .Data flow Diagram Above figure shows how data flows between user and receiver. Firstly user registration for login with valid username and password then ID key generation and identity key authentication when the verify both key then secrete key authentication verification it goes to Attribute based encryption specification/verification of user this user valid for login or not. If user valid for login then documents handling of user, and user not valid then found error for document handling. 4 TYPEOF ENCRYPTION TECHNIQUES 4.1 Key-Aggregate Cryptosystem New public-key cryptosystems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. A key-aggregate encryption system basically includes five algorithmic steps as follows- The data owner establishes the public system parameter by using Setup and generates a public/master-secret key pair by using KeyGen. Messages can be encrypted using Encrypt by anyone who also decides what ciphertext class is associated with the plaintext message to be encrypted. The data owner can use the master-secret to generate an aggregate decryption key for a set of ciphertext classes by Extract. The generated keys can be passed to Receivers securely via secure e-mails. Finally, any user with an aggregate key can decrypt any ciphertext provided that the ciphertext’s class is contained in the aggregate key via Decrypt. a) Setup Phase The data owner executes the setup phase for an account onserver which is not trusted. The setup algorithm only Take simplicit security parameter. b)KeyGen Phase This phase is executed by data owner to generate the public or the master key pair (pk, msk). c) Encrypt Phase This phase is executed by anyone who wants to send the encrypted data. Encrypt (pk, m, i), the encryption algorithm takes input as public parameters pk, a message m, and I denoting cipher text class. The algorithm encrypts message m and produces a cipher text C such that only a user that has a set of attributes that satisfies the access structure is able to decrypt the message. d) Cloud Storage Cloud storage is nowadays very popular storage system. Cloud storage is storing of data off- site to the physical storage which is maintained by third party. Cloud storage is saving of digital data in logical pool and physical storage spans multiple servers which are manage by third party. Third party is responsible for keeping data available and accessible and physical environment should be protected and running at all time. Instead of storing data to the hard drive or any other local storage, we save data to remote storage which is accessible from anywhere and anytime. It reduces efforts of carrying physical storage to everywhere. By using cloud storage we can access information from any computer through internet which omitted limitation of accessing information from same computer where it is stored. While considering data privacy, we cannot rely on traditional technique of
  • 3. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 71 authentication, because unexpected privilege escalation will expose all data. Solution is to encrypt data before uploading to the server with user’s own key. Data sharing is again important functionality of cloud storage, because user can share data from anywhere and anytime to anyone. For example, organization may grant permission to access part of sensitive data to their employees. But challenging task is that how to share encrypted data. Traditional way is user can download the encrypted data from storage, decrypt that data and send it to share with others, but it loses the importance of cloud storage. 4.2 Identity encryption techniques  System will automatically generate identity string of every user using set of different system generated algorithms  Identity based encryption is a type of public key encryption in which public-key of a user can be set as an identity-string of the user  At the time of registration every user will get his/her identity key on email  While uploading and downloading documents on cloud, every user have to prove his/her identity using identity key. 4.3Attribute based encryption technique  In this application we propose attribute based encryption technique for documents encryption  When user wants to upload any document for particular set of users, he/she have to specify permissions in attribute format  ABE enhances the security of system and prevent documents from leakage when attacker knows secrete key  In order to prevent key escrow and cipher text enlargement problem we propose xml documents to store users attributes  System will automatically create one xml doc for every user to specify his documents access attributes  The xml document will be stored in encrypted format on server. 5. CONCLUSIONS To share data flexibly is vital thing in cloud computing. Users prefer to upload there data on cloud and among different users. Outsourcing of data to server may lead to leak the private data of user to everyone. Encryption is a on solution which provides to share selected data with desired candidate. Sharing of decryption keys in secure way plays important role. Public-key cryptosystems provides delegation of secret keys for different cipher text classes in cloud storage. The delegate gets securely an aggregate key of constant size It is required to keep enough number of cipher texts classes as they increase fast and the cipher text classes are bounded that is the limitation. 6.ACKNOWLEDGMENTS I would like to extend my gratitude to many people who helped me to bring this paper fruition. First I would like to thank Prof. Mrunali Vaidya. I am so deeply grateful for her help, professionalism, and valuable guidance throughout this paper. I would also like to thank to my friends and colleague. This accomplishment would not have been possible without them. Thank you. 7.REFERENCES [1].S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE -Simple Privacy-Preserving Identity-Management for Cloud Environment,”in Applied Cryptography and Network Security –ACNS 2012, ser.LNCS, vol. 7341. Springer, 2012, pp. 526–543. [2].C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362–375, 2013. [3].B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Dataon the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013. [4].Cheng Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng,,” Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage “,IEEE Transaction on Parellel and Distributed System, vol. 25, no. 2, February 2014 . [5]S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, “Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,” Proc. ACM Conf. Computer and Comm. Security, pp. 152-161, 2010. [6].S. Singh,”Different Cloud Computing Standards a Huge Challenge”, The Economic times, 4 June 2009. [7] .J. Urquhart, “The Biggest Cloud computingIssue of 2009is Trust”, C-NetNews, 7 Jan 2009 [8].D. Boneh and M. K. Franklin, “Identity -Based Encryption from the Weil Pairing,” in Proceedings of Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229. [9]M. Chase and S. S. M. Chow,“Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in
  • 4. International Journal of Science and Engineering Applications Volume 5 Issue 2, 2016, ISSN-2319-7560 (Online) www.ijsea.com 72 CM Conference on Computer and Communications Security, 2009, pp. 121 –130.