SlideShare a Scribd company logo
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE ABSTRACT Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known. Existing System There exist several expressive ABE schemes where the decryption algorithm only requires a constant number of pairing computations. Recently, Green et al. proposed a remedy to this problem by introducing the notion of ABE with outsourced decryption, which largely eliminates the decryption overhead for users. Based on the existing ABE schemes, Green et al. also presented concrete ABE schemes with outsourced decryption. 
In these existing schemes, a user provides an untrusted server, say a proxy operated by a cloud service provider, with a transformation key TK that allows the latter to translate any ABE ciphertext CT satisfied by that user’s attributes or access policy into a simple ciphertext CT’, and it only incurs a small overhead for the user to recover the plaintext from the transformed ciphertext CT’. The security property of the ABE scheme with outsourced decryption guarantees that an adversary (including the malicious cloud server) be not able to learn anything about the encrypted message; however, the scheme provides no guarantee on the correctness of the
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
transformation done by the cloud server. In the cloud computing setting, cloud service providers may have strong financial incentives to return incorrect answers, if such answers require less work and are unlikely to be detected by users. Proposed System: We considered the verifiability of the cloud’s transformation and provided a method to check the correctness of the transformation. However, the we did not formally define verifiability. But it is not feasible to construct ABE schemes with verifiable outsourced decryption following the model defined in the existing. Moreover, the method proposed in existing relies on random oracles (RO). Unfortunately, the RO model is heuristic, and a proof of security in the RO model does not directly imply anything about the security of an ABE scheme in the real world. It is well known that there exist cryptographic schemes which are secure in the RO model but are inherently insecure when the RO is instantiated with any real hash function. In this thesis work, firstly modify the original model of ABE with outsourced decryption in the existing to allow for verifiability of the transformations. After describing the formal definition of verifiability, we propose a new ABE model and based on this new model construct a concrete ABE scheme with verifiable outsourced decryption. Our scheme does not rely on random oracles. In this paper we only focus on CP-ABE with verifiable outsourced decryption. The same approach applies to KP-ABE with verifiable outsourced decryption.To assess the performance of our ABE scheme with verifiable outsourced decryption, we implement the CP-ABE scheme with verifiable outsourced decryption and conduct experiments on both an ARM-based mobile device and an Intel-core personal computer to model a mobile user and a proxy, respectively. Problem Statement One of the main efficiency drawbacks of the most existing ABE schemes is that decryption is expensive for resource-limited devices due to pairing operations, and the number of pairing operations required to decrypt a ciphertext grows with the complexity of the access policy.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
The above observation motivates us to study ABE with verifiable outsourced 
decryption in this thesis work. Here emphasized that an ABE scheme with secure outsourced 
decryption does not necessarily guarantee verifiability (i.e., correctness of the transformation 
done by the cloud server) 
Architecture: 
key 
data 
attributes 
Encryption 
ciphertext 
Encrypted 
attributes 
Encrypted 
attributes 
Access 
structure 
ciphertext 
attributes 
key 
encryption 
Outsource 
decryption plaintext 
cloud 
user 
retriever 
verification 
MODULES 
1. Setup Phase 
2. Encrypt Phase 
3. KeyGen Phase, 
4. Decrypt Phase 
Modules Description 
1 SETUP PHASE 
The setup algorithm takes no input other than the implicit security parameter. It outputs 
the public parameters PK and a master key MK.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
2 ENCRYPT PHASE 
Encrypt(PK,M, A). The encryption algorithm takes as input the public parameters PK, a 
message M, and an access structure A over the universe of attributes. The algorithm will encrypt 
M and produce a ciphertext CT such that only a user that possesses a set of attributes that 
satisfies the access structure will be able to decrypt the message. We will assume that the 
ciphertext implicitly contains A. 
3 KEY GEN PHASE 
Key Generation(MK,S). The key generation algorithm takes as input the master key MK 
and a set of attributes S that describe the key. It outputs a private key SK 
4 DECRYPT PHASE 
Decrypt(PK, CT, SK). The decryption algorithm takes as input the public parameters PK, 
a ciphertext CT, which contains an access policy A, and a privatekey SK, which is a private key 
for a set S of attributes. If the set S of attributes satisfies the access structure A then the algorithm 
will decrypt the ciphertext and 
return a message M.
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
System Configuration:- 
H/W System Configuration:- 
Processor - Pentium –III 
Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA 
S/W System Configuration:- 
 Operating System :Windows95/98/2000/XP 
 Application Server : Tomcat5.0/6.X 
 Front End : HTML, Java, Jsp 
 Scripts : JavaScript. 
 Server side Script : Java Server Pages. 
 Database : Mysql 
 Database Connectivity : JDBC. 
CONCLUSION 
How to protect users’ data privacy is a central question of cloud storage. With more mathematical tools, cryptographic schemes are getting more versatile and often involve multiple keys for a single application. In this article, we consider how to “compress” secret keys in public-key cryptosystems which support delegation of secret keys for different ciphertext classes in cloud storage. No matter which one among the power set of classes, the delegatee can always
#13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 
website: shakastech.com, Gmail: Shakastech@gmail.com 
Phone No: 0416-6066663/2247353 Mobile No: 9500218218 
get an aggregate key of constant size. Our approach is more flexible than hierarchical key assignment which can only save spaces if all key-holders share a similar set of privileges.

More Related Content

What's hot (20)

DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam
 
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
LeMeniz Infotech
 
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
PDF
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
PDF
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects
 
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
DOC
An efficient certificate less encryption for
Shakas Technologies
 
PPTX
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
PDF
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
PPTX
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
PDF
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
 
PPTX
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PDF
Certificate less key management scheme in
IJNSA Journal
 
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
chennaijp
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
LeMeniz Infotech
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
1crore projects
 
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
An efficient certificate less encryption for
Shakas Technologies
 
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
 
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Certificate less key management scheme in
IJNSA Journal
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
chennaijp
 

Similar to Key aggregate cryptosystem for scalable data sharing in cloud storage (20)

PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
DOCX
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
PPTX
Attribute-Based Encryption for Cloud Security
Mphasis
 
DOCX
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
PPTX
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
DOCX
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
DOCX
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
PDF
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
IEEEGLOBALSOFTTECHNOLOGIES
 
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
Attribute-Based Encryption for Cloud Security
Mphasis
 
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
Audit free cloud storage via deniable attribute-based encryption
Shakas Technologies
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
ASAITHAMBIRAJAA
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
DOCX
A Novel Framework for Credit Card.
Shakas Technologies
 
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
DOCX
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
Ad

Recently uploaded (20)

PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PDF
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPT on the Development of Education in the Victorian England
Beena E S
 
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
community health nursing question paper 2.pdf
Prince kumar
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 

Key aggregate cryptosystem for scalable data sharing in cloud storage

  • 1. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE ABSTRACT Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known. Existing System There exist several expressive ABE schemes where the decryption algorithm only requires a constant number of pairing computations. Recently, Green et al. proposed a remedy to this problem by introducing the notion of ABE with outsourced decryption, which largely eliminates the decryption overhead for users. Based on the existing ABE schemes, Green et al. also presented concrete ABE schemes with outsourced decryption. In these existing schemes, a user provides an untrusted server, say a proxy operated by a cloud service provider, with a transformation key TK that allows the latter to translate any ABE ciphertext CT satisfied by that user’s attributes or access policy into a simple ciphertext CT’, and it only incurs a small overhead for the user to recover the plaintext from the transformed ciphertext CT’. The security property of the ABE scheme with outsourced decryption guarantees that an adversary (including the malicious cloud server) be not able to learn anything about the encrypted message; however, the scheme provides no guarantee on the correctness of the
  • 2. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 transformation done by the cloud server. In the cloud computing setting, cloud service providers may have strong financial incentives to return incorrect answers, if such answers require less work and are unlikely to be detected by users. Proposed System: We considered the verifiability of the cloud’s transformation and provided a method to check the correctness of the transformation. However, the we did not formally define verifiability. But it is not feasible to construct ABE schemes with verifiable outsourced decryption following the model defined in the existing. Moreover, the method proposed in existing relies on random oracles (RO). Unfortunately, the RO model is heuristic, and a proof of security in the RO model does not directly imply anything about the security of an ABE scheme in the real world. It is well known that there exist cryptographic schemes which are secure in the RO model but are inherently insecure when the RO is instantiated with any real hash function. In this thesis work, firstly modify the original model of ABE with outsourced decryption in the existing to allow for verifiability of the transformations. After describing the formal definition of verifiability, we propose a new ABE model and based on this new model construct a concrete ABE scheme with verifiable outsourced decryption. Our scheme does not rely on random oracles. In this paper we only focus on CP-ABE with verifiable outsourced decryption. The same approach applies to KP-ABE with verifiable outsourced decryption.To assess the performance of our ABE scheme with verifiable outsourced decryption, we implement the CP-ABE scheme with verifiable outsourced decryption and conduct experiments on both an ARM-based mobile device and an Intel-core personal computer to model a mobile user and a proxy, respectively. Problem Statement One of the main efficiency drawbacks of the most existing ABE schemes is that decryption is expensive for resource-limited devices due to pairing operations, and the number of pairing operations required to decrypt a ciphertext grows with the complexity of the access policy.
  • 3. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 The above observation motivates us to study ABE with verifiable outsourced decryption in this thesis work. Here emphasized that an ABE scheme with secure outsourced decryption does not necessarily guarantee verifiability (i.e., correctness of the transformation done by the cloud server) Architecture: key data attributes Encryption ciphertext Encrypted attributes Encrypted attributes Access structure ciphertext attributes key encryption Outsource decryption plaintext cloud user retriever verification MODULES 1. Setup Phase 2. Encrypt Phase 3. KeyGen Phase, 4. Decrypt Phase Modules Description 1 SETUP PHASE The setup algorithm takes no input other than the implicit security parameter. It outputs the public parameters PK and a master key MK.
  • 4. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 2 ENCRYPT PHASE Encrypt(PK,M, A). The encryption algorithm takes as input the public parameters PK, a message M, and an access structure A over the universe of attributes. The algorithm will encrypt M and produce a ciphertext CT such that only a user that possesses a set of attributes that satisfies the access structure will be able to decrypt the message. We will assume that the ciphertext implicitly contains A. 3 KEY GEN PHASE Key Generation(MK,S). The key generation algorithm takes as input the master key MK and a set of attributes S that describe the key. It outputs a private key SK 4 DECRYPT PHASE Decrypt(PK, CT, SK). The decryption algorithm takes as input the public parameters PK, a ciphertext CT, which contains an access policy A, and a privatekey SK, which is a private key for a set S of attributes. If the set S of attributes satisfies the access structure A then the algorithm will decrypt the ciphertext and return a message M.
  • 5. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC. CONCLUSION How to protect users’ data privacy is a central question of cloud storage. With more mathematical tools, cryptographic schemes are getting more versatile and often involve multiple keys for a single application. In this article, we consider how to “compress” secret keys in public-key cryptosystems which support delegation of secret keys for different ciphertext classes in cloud storage. No matter which one among the power set of classes, the delegatee can always
  • 6. #13/19,1st Floor, Municipal Colony, Kangeyanellore Road, Gandhi Nagar, Vellore-632006 website: shakastech.com, Gmail: [email protected] Phone No: 0416-6066663/2247353 Mobile No: 9500218218 get an aggregate key of constant size. Our approach is more flexible than hierarchical key assignment which can only save spaces if all key-holders share a similar set of privileges.