A Review on Key Aggregate Policies for Secure Data Sharing in Cloud Storage
Pages : 310-312
Download PDF
Abstract
Sensitive knowledge changed must be firmly done to verify the integrity of cloud knowledge, to prevent it from being disclosed to or changed by unauthorized parties. Several enterprises source knowledge storage to the cloud specified a member of a corporation or knowledge owner will simply share knowledge with different members or users with confidentiality. The new public- key cryptosystems that turn out constant-size ciphertext where specified ciphertext area unit labelled with sets of attributes and personal keys area unit related to structures that management that user is ready to rewrite. In different words, the key holder will unleash a constant-size mixture key for versatile preferences of ciphertext set in cloud storage, however the opposite encrypted files outside the set stay secret. Additionally to authentication and privacy preservation this theme tries to satisfy all different security necessities with key management and achieves higher measurability once the amount of access levels will increase.
Keywords: Cloud storage, data sharing, key-aggregate encryption
Article published in International Journal of Current Engineering and Technology, Vol.5, No.1 (Feb-2015)