Journal Title : International Journal of Modern Trends in Engineering and Science


Author’s Name : Shyam P R | A N Karthikeyan | J Stanly Jayaprakash  unnamed

Volume 03 Issue 08 2016

ISSN no:  2348-3121

Page no: 209-212

Abstract – Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Keywords— Constant-Size Cipher Texts; Security Analysis; First Public-Key Patient-Controlled Encryption; Data Filtering Mechanism 


  1. Ellen Messmer (2012). Gartner: Growth in Cloud Computing to shape 2013 security trends, Network World.
  2. Sachdev Abha Thakral, and Mohit Bhansali. “Addressing the Cloud Computing Security Menace.” IJRET, Volume 2, Issue 2, pp. 126-130, Feb 2013.
  3. Chen, Yao, and Radu Sion. “On securing untrusted clouds with cryptography. “Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. ACM, 2010.
  4. Talbot, David (2009). “How Secure Is Cloud Computing?” Technology Review.
  5. Agudo, Isaac and Nuez, David and Giammatteo, Gabriele and Rizomiliotis, Panagiotis and Lambrinoudakis, Costas. Cryptography Goes to the Cloud. In Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R., editors, Secure and Trust Computing, Data Management, and Applications, pages 190–197, Springer Berlin Heidelberg, 2011.
  6. Op-ed: Encryption, not restriction, is the key to safe cloud computing.
  7. “Cloud Security and Privacy”, Tim Mather, Subra Kumaraswamy, and Shahed Latif – O’Reilly Book. 
  8. Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. “Performance Evaluation of Symmetric Encryption Algorithms.” IJCSNS International Journal of Computer Science and Network Security 8.12 (2008): 280-286.
  9. Sanchez-Avila, C., and R. Sanchez-Reillol. “The Rijndael block cipher (AES proposal): a comparison with DES.” Security Technology, 2001 IEEE 35th International Carnahan Conference on. IEEE, 2001.
  10. NIST, FIPS PUB 197, “Advanced Encryption Standard (AES),” November 2001 [Online]. 
  11. Enterprise and Individual Users to fuel Growth in Cloud Computing .
  12. Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast.
  13. John Harauz, Lori M. Kaufman and Bruce Potter, ―Data security in the world of cloud computing ―, 2009 IEEE CO Published by the IEEE Computer and Reliability Societies.
  14. Jensen, Meiko, et al. “On technical security issues in cloud computing.” Cloud Computing, 2009. CLOUD’09. IEEE International Conference on. IEEE, 2009.