Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Data Sharing on the Cloud with Time-Bound Key Assignment
A. R. Quadri1, T. Anudeep Krishna2, P. Harsha3, P. Pawan Kalyan4
1A. R. Quadri, Department of CSE, KL University, Vijayawada (Andhra Pradesh), India.
2T. Anudeep Krishna, Department of CSE, KL University, Vijayawada (Andhra Pradesh), India.
3P. Harsha, Department of CSE, KL University, Vijayawada (Andhra Pradesh), India.
4P. Pawan Kalyan, Department of CSE, KL University, Vijayawada (Andhra Pradesh), India.
Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 436-440 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5348058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Data sharing is an indispensable convenience in disseminated stockpiling. In this article, we advise the most ideal approach to strongly, gainfully, and adaptable distribute the records among others in disseminated stockpiling. We delineate new open key cryptosystems which produce predictable size figure messages with the true objective that compelling task of interpreting rights for any course of action of figure works are possible. The interest is that one can add up to any game plan of riddle keys and make them as limited as a single key, anyway consolidating the power of all the keys being amassed. In a manner of speaking, the riddle key holder can release an unfaltering size absolute key for versatile choices of figure content set in circulated stockpiling; anyway the other mixed archive outside the set remains private. This limited complete key will be profitably sent to the other individuals or be secured in an astute card with very confined secure limit. We give formal security examination of our arrangements in the standard model. We in like manner depict other usage of our schemes. In the explicit way of our arrangements would give the essential open key patient controlled encryptions for versatile chain of significances, which was yet to be known.
Keyword: Cloud, Data sharing, Cryptosystem.
Scope of the Article: Cloud Computing.