This paper is published in Volume-4, Issue-2, 2018
Area
Cloud Storage
Author
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar
Org/Univ
SRM Institute of Science and Technology, Chennai, Tamil Nadu, India
Keywords
Plain text, Encrypt, Public key, Cipher text decrypt.
Citations
IEEE
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar. Data sharing using middle-key authentication, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar (2018). Data sharing using middle-key authentication. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar. "Data sharing using middle-key authentication." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar. Data sharing using middle-key authentication, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar (2018). Data sharing using middle-key authentication. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar. "Data sharing using middle-key authentication." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Abstract
The basic idea of the project is to share the data in the cloud. The dataset in the cloud storage is secured and more flexible to share the data with others. For that, we propose Key- Aggregate Cryptosystem which produces cipher text of a constant size such that decipherment rights are often assigned to them. By combining a collection of secret key, we will create a compact single key. By exploiting this compact key, we will send others very restricted secure storage. First, owner of the information sets up the general public system. Next Key information formula generates a public or master key. By exploiting this key, the user will convert plain text into cipher text. After that user can provide input as master secret key by an Extract function. It will manufacture output as mixture decipherment key. And this obtained secret key is safely sent to the receiver. Then the employment with the mixture key will decode the text of a cipher through the use of decode perform.