Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 01 | Jan -2017

p-ISSN: 2395-0072

www.irjet.net

Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud Miss. Swati V.Thakre1, Prof. K.K.Chhajed2, Prof.V.B.Bhagat3 1Miss.Swati 2

V.Thakre, P.R.Pote College Of Engineering, Maharashtra, India.

Prof. K. K. Chhajed, Assistant Professor Department of Computer Science and Engineering, P.R.Pote College Of Engineering, Maharashtra, India.

3Prof.

V. B. Bhagat, Assistant Professor Department of Computer Science and Engineering, P.R.Patil College Of Engineering, Maharashtra, India.

---------------------------------------------------------------------***----------------------------------------------------------------------

Abstract: Cloud technology is very constructive and useful

cloud system for sharing data securely. First, the data

in present new technological era. Cloud computing has given

owner should be able to specify a set of users that are

the users the accessibility to deploy number of files to the

permitted to view data. Any member within the group

centralized cloud and share those with number of users.

should be able to gain access to the data anytime. The data

Cloud computing always comes with the hurdles of security

owner should be able to add new users, revoke access

concerns. Hence to achieve cloud data security, To enable

rights against any member of the group over his or her

secure and flexible data sharing in the cloud, efficient

shared data. Data owner or group admin, when he wants to

management of encryption keys are required .The data

share his data in the group he sends a key to the members

owner always needs to encrypt the files before uploading

of the group for data encryption [3]. And users get the

and it must decrypt before end users. This system needs

access to the data with the help of any member of the

secure storage of keys, but as files gets increased in number

group can then get the encrypted data from the cloud and

keys management becomes complex. By using Key based

decrypt the data using the key. But still this technique will

Encryption scheme user only need to submit aggregate key

not work properly if there is n number of users in the

for file sharing in groups and searchable encryption and also

group. While considering data privacy, we cannot rely on

submit aggregate trapdoor. This system provide number of benefits to multiuser and also reduce trapdoor.

traditional

technique

of

authentication,

because

Key Word: Searchable Encryption, Cloud Computing,

unexpected privilege escalation will expose all data. Solution is to encrypt data before uploading to the server

Aggregate Key, Data Privacy

with users own key. Data sharing is again important

1. INTRODUCTION

functionality of cloud storage, because user can share data

Cloud architecture can be used to allow data

from anywhere and anytime to anyone. So our aim is to

sharing capabilities and this can provide n number of

develop an efficient data sharing scheme that enable

benefits to the user. At present there is a push for IT

complete control. This scheme also aims to enable group of

organizations to increase their data sharing efforts. Cloud

users perform a keyword search over authorized

computing, also known as 'on-demand computing', is a

encrypted files using single aggregate trapdoor generated

kind of Internet-based computing, where shared resources,

from the single aggregate key [4].

data and information are provided to computers and other devices on-demand [2]. There are some requirements in

Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 634


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud by IRJET Journal - Issuu