{"title":"使用可审计聚合键的安全云数据共享","authors":"P. Pol, Amrit Priyadarshi","doi":"10.1109/ICAECCT.2016.7942596","DOIUrl":null,"url":null,"abstract":"In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by public key encryption. The valid user can access their information using their private key and the global secret key information which is regulate during or after authentication process. System does not bother if secrete key either hack, the intruder cannot access the data while it can be decrypted only by using a private key. Here is no importance to send associate key and its file. All data will be encrypted by the global Secret Key. So data will be protected at a cloud place. Consumers who need file or information will access the data using their private key so file and its key not required.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"66 1","pages":"267-272"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured Cloud data sharing using auditable Aggregate key\",\"authors\":\"P. Pol, Amrit Priyadarshi\",\"doi\":\"10.1109/ICAECCT.2016.7942596\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by public key encryption. The valid user can access their information using their private key and the global secret key information which is regulate during or after authentication process. System does not bother if secrete key either hack, the intruder cannot access the data while it can be decrypted only by using a private key. Here is no importance to send associate key and its file. All data will be encrypted by the global Secret Key. So data will be protected at a cloud place. Consumers who need file or information will access the data using their private key so file and its key not required.\",\"PeriodicalId\":6629,\"journal\":{\"name\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"volume\":\"66 1\",\"pages\":\"267-272\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECCT.2016.7942596\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942596","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured Cloud data sharing using auditable Aggregate key
In Cloud computing and integrity privacy play vital role. Key Aggregation, offer integrity and privacy to user without involving key information each other and every file. Paper follows asymmetric key management, all the information followed by public key encryption. The valid user can access their information using their private key and the global secret key information which is regulate during or after authentication process. System does not bother if secrete key either hack, the intruder cannot access the data while it can be decrypted only by using a private key. Here is no importance to send associate key and its file. All data will be encrypted by the global Secret Key. So data will be protected at a cloud place. Consumers who need file or information will access the data using their private key so file and its key not required.