Author : Ashish Ladda 1
Date of Publication :22nd February 2018
Abstract: Cloud computing may be an in style space of analysis for inventors. And it's important in information sharing applications. On cloud the info being shared should be secure. The pliability and therefore the potency of the info is rely upon the protection parameter. To attain purpose we tend to outline new algorithms that is rely upon public key cryptography and outline constant size cipher text by exploitation these key we are able to decode cipher text. The opposite encrypted files except this cipher stay personal. The survey depicts some encoding schemes introduced during this information privacy for firmly and economical sharing of confidential information over a secure channel. Recently analysis concentrate on aggregation of keys of the keys in signal aggregation key that is assistance on load of network information sharing being vital practicality in cloud storage implement show to firmly, expeditiously, and flexibly share information with others.
Reference :
-
- S. G. Akl and P. D. Taylor, ―Cryptographic Solution to a Problem of Access Control in a Hierarchy,‖ ACM Transactions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239–248, 1983.
- G. C. Chick and S. E. Tavares, ―Flexible Access Control with Master Keys,‖ in Proceedings of Advances in Cryptology – CRYPTO ’89, ser. LNCS, vol. 435. Springer, 1989, pp. 316–322.
- W.-G. Tzeng, ―A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,‖ IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 14, no. 1, pp. 182–188, 2002.
- G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci, ―Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,‖ J. Cryptology, vol. 25, no. 2, pp. 243–270, 2012.
- J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, ―Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,‖ in Proceedings of ACM Workshop on Cloud Computing Security (CCSW ’09). ACM, 2009, pp. 103–114
- R. Canetti and S. Hohenberger, “Chosen-Ciphertext Secure Proxy Re-Encryption,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ‟07). ACM, 2007, pp. 185–194.
- L. Hardesty, “Secure computers aren‟t so secure,” MIT press, 2009, http:// www. physorg. com/news 176107396.html.
- C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362–375, 2013.
- B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013
- G. C. Chick and S. E. Tavares, “Flexible Access Control with Master Keys,” in Proceedings of Advances in Cryptology – CRYPTO ‟89, ser. LNCS, vol. 435. Springer, 1989, pp. 316–322.
- W.-G. Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 14, no. 1, pp. 182–188, 2002.