International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017
p-ISSN: 2395-0072
www.irjet.net
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud Miss. Swati V.Thakre1, Prof. K.K.Chhajed2, Prof.V.B.Bhagat3 1Miss.Swati 2
V.Thakre, P.R.Pote College Of Engineering, Maharashtra, India.
Prof. K. K. Chhajed, Assistant Professor Department of Computer Science and Engineering, P.R.Pote College Of Engineering, Maharashtra, India.
3Prof.
V. B. Bhagat, Assistant Professor Department of Computer Science and Engineering, P.R.Patil College Of Engineering, Maharashtra, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract: Cloud technology is very constructive and useful
cloud system for sharing data securely. First, the data
in present new technological era. Cloud computing has given
owner should be able to specify a set of users that are
the users the accessibility to deploy number of files to the
permitted to view data. Any member within the group
centralized cloud and share those with number of users.
should be able to gain access to the data anytime. The data
Cloud computing always comes with the hurdles of security
owner should be able to add new users, revoke access
concerns. Hence to achieve cloud data security, To enable
rights against any member of the group over his or her
secure and flexible data sharing in the cloud, efficient
shared data. Data owner or group admin, when he wants to
management of encryption keys are required .The data
share his data in the group he sends a key to the members
owner always needs to encrypt the files before uploading
of the group for data encryption [3]. And users get the
and it must decrypt before end users. This system needs
access to the data with the help of any member of the
secure storage of keys, but as files gets increased in number
group can then get the encrypted data from the cloud and
keys management becomes complex. By using Key based
decrypt the data using the key. But still this technique will
Encryption scheme user only need to submit aggregate key
not work properly if there is n number of users in the
for file sharing in groups and searchable encryption and also
group. While considering data privacy, we cannot rely on
submit aggregate trapdoor. This system provide number of benefits to multiuser and also reduce trapdoor.
traditional
technique
of
authentication,
because
Key Word: Searchable Encryption, Cloud Computing,
unexpected privilege escalation will expose all data. Solution is to encrypt data before uploading to the server
Aggregate Key, Data Privacy
with users own key. Data sharing is again important
1. INTRODUCTION
functionality of cloud storage, because user can share data
Cloud architecture can be used to allow data
from anywhere and anytime to anyone. So our aim is to
sharing capabilities and this can provide n number of
develop an efficient data sharing scheme that enable
benefits to the user. At present there is a push for IT
complete control. This scheme also aims to enable group of
organizations to increase their data sharing efforts. Cloud
users perform a keyword search over authorized
computing, also known as 'on-demand computing', is a
encrypted files using single aggregate trapdoor generated
kind of Internet-based computing, where shared resources,
from the single aggregate key [4].
data and information are provided to computers and other devices on-demand [2]. There are some requirements in
Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 634