Demonstrating Broadcast Aggregate Keys for Data Sharing in Cloud
- 30 Downloads
In recent years, the major issue in cloud computing is providing privacy for getting to re-appropriating information put away on cloud. To store also to share information safely, cryptosystem is utilized. In cryptosystem, the client needs to scramble the data before securing data on cloud and after that decode the data to get to it. This errand can need numerous keys for information encode just like information decoding. But the problem arises with data integrity where data can be modified or the files can be replaced without the knowledge of the data owner. So, to ensure the trustworthiness of the record, the information proprietor figures the hash-based message authentication code (HMAC) signature on each encoded document.
KeywordsCloud Storage Data sharing Key-aggregate encryption Data integrity Hash-based message authentication code (HMAC)
- 3.Sun Y, Liu KJR (2004) Scalable hierarchical access control in secure group communications. 0-7803-8356-7/04/$20.00 (C), IEEEGoogle Scholar
- 4.Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP’07), IEEE, pp 321–334Google Scholar
- 5.Pathan ASK (ed) (2016) Security of self-organizing networks: MANET, WSN, WMN. CRC Press, VANETGoogle Scholar
- 6.Bachhav S, Chaudhari C, Shinde N, Kaloge P (2015) Secure multi-cloud data sharing using key aggregate cryptosystem for scalable data sharing. Int J Comput Sci Inf Technol 6(5):4479–4482Google Scholar