Bandaru Ravi Teja, K.Ashok Kumar


Data discussing systems that derive from cloud storage has acquired attention within the recent occasions. Customers are furthermore taking pleasure in the practicality of discussing data by way of cloud storage and through this method customers are increasingly more concerned regarding accidental data leaks inside the cloud. These data leaks, caused using a malicious foe can typically result in severe breaches of private privacy. Within our work we advise a manuscript idea of key aggregate searchable file encryption by instantiating the idea completely via a concrete key aggregate searchable file encryption system. Here the information owner just must allocate a specific key perfectly into a user for discussing a large number of documents, and user simply must submit a specific trapdoor towards cloud for querying shared documents. The suggested system is applicable for just about any cloud storage that supports searchable group data discussing functionality.


Data Sharing; Key Aggregate Searchable Encryption; Data Leaks; Privacy; Data Owner; Cloud Storage; Trapdoor; Malicious Adversary; Documents


. Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System”, In: Pairing-Based Cryptography C Pairing 2007, LNCS, pp. 2-22, 2007.

. J. Li, Q. Wang, C. Wang. “Fuzzy keyword search over encrypted data in cloud computing”, Proc. IEEE INFOCOM, pp. 1-5, 2010.

. C. Bosch, R. Brinkma, P. Hartel. “Conjunctive wildcard search over encrypted data”, Secure Data Management. LNCS, pp. 114- 127, 2011.

. B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud”, Proc. 10th Int’l Conf. Applied Cryptography and Network Security, pp. 507- 525, 2012.

. D. Boneh, C. Gentry, B. Waters.“ Collusion resistant broadcast encryption with short ciphertexts and private keys”, Advances in CryptologyCCRYPTO 2005, pp. 258-275, 2005.

. D. H. Phan, D. Pointcheval, S. F. Shahandashti, et al. “Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts”, International journal of information security, 12(4): 251-265, 2013.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.