IJMTES – DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Najma K | J Stanly Jayaprakash  unnamed

Volume 03 Issue 06 2016

ISSN no:  2348-3121

Page no: 105-107

Abstract – Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Keywordsconstant-size ciphertexts; security analysis; the first public-key patient-controlled encryption; data filtering mechanism 

Reference

  1. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable Data Possession at Untrusted Stores”.
  2. G. Ateniese, R. DiPietro, L. V. Mancini, G. Tsudik, “Scalable and Efficient Provable Data Possession”.
  3. C. C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, “Dynamic Provable Data Possession”.
  4. F. Seb´e, J. Domingo-Ferrer, A. Mart´ınez-Ballest´e, Y. Deswarte, J. Quisquater, “Efficient Remote Data Integrity checking in Critical Information Infrastructures”.
  5. H.Q. Wang, “Proxy Provable Data Possession in Public Clouds,”.
  6. Y. Zhu, H. Hu, G.J. Ahn, M. Yu, “Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage”.
  7. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, S. S. Yau, “Efficient Provable Data Possession for Hybrid Clouds”.
  8. R. Curtmola, O. Khan, R. Burns, G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession”.
  9. A. F. Barsoum, M. A. Hasan, “Provable Possession and Replication of Data over Cloud Cloud Servers”..
  10. Z. Hao, N. Yu, “A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability”, 2010 Second International Symposium on Data, Privacy.
  11. A. F. Barsoum, M. A. Hasan, “On Verifying Dynamic Multiple Data Copies over Cloud Cloud Servers”.
  12. A. Juels, B. S. Kaliski Jr., “PORs: Proofs of Retrievability for Large Files”.
  13. H. Shacham, B. Waters, “Compact Proofs of Retrievability”.
  14. K. D. Bowers, A. Juels, A. Oprea, “Proofs of Retrievability: Theory and Implementation”.
  15. Q. Zheng, S. Xu. Fair and Dynamic Proofs of Retrievability.