Constructing a Secure Data Storage System That Supports Multiple Functions by Using Key Aggregation for Data Sharing in Cloud Storage: A Review
DOI:
https://doi.org/10.56532/mjsat.v2i1.33Keywords:
Data encryption, Data security, Key aggregation, Cloud Storage, Cloud security, cloud security, Network securityAbstract
The old method used for examining data correctness is to recover the entire data from the cloud and then validate data reliability by scrutinizing the correctness of signatures or numeric values of the data as a whole. In modern cryptology, an essential problem to study here is to maintain the greatest benefit of the privacy of given information to perform multiple encryptions. The study shows how a decryption key is made stronger in the sense that it enables several ciphertexts to be decrypted without increasing their size. The statement of the problem lies in the fact that creating an effective public-key encryption system that supports flexible delegation is decipherable by a fixed-size decryption key that could be produced by the holder of the master-secret key. The solution to this problem is by presenting a definite type of public-key encryption known as key-aggregate cryptosystem (KAC). By using this method, users who hold master-secret key could convert a message through a public-key, and an identifier of ciphertext called “class”. This means that the ciphertexts could be further categorized into various classes. The main objective of this paper is to design a secure data storage system that provides multiple stimulating functions by which the storage system is divided and has no major authority.
References
K. M. Patel, and S. S. Bahekar, "Study on Homomorphic Linear Authenticator in Wireless Ad Hoc Networks ", IJIREEICE, Vol. 5, 2017, pp. 16 -19.
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Computers, vol. 62, no. 2,2013, pp. 362-375.
C. F. Blumzon, and A.-T. Pănescu, Data Storage, Cham: Handbook of Experimental Pharmacology, vol 257. Springer, 2019.
“Data sharing,” Wikipedia, the free encyclopedia. April. 31, 2016. [Online]. Available: https://en.wikipedia.org/wiki/ Data_sharing. [Accessed Apr. 15, 2021].
J. Melesko, and E. Kurilovas, " Semantic Technologies in e-Learning: Learning Analytics and Artificial Neural Networks in Personalised Learning Systems", in Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, 2018, Vol. 34, pp. 1 -7.
M. M. Ruke, S. Gore, S. Chavan, and prof : B. Dakhare, " Maintaining Data Integrity For Shared Data In Cloud", Advanced Computing: An International Journal, Vol. 8, No. ½, 2021, pp. 1 -8.
B. Mahalakshmi, and G. Suseendran, " An Analysis of Cloud Computing Issues on Data Integrity, Privacy and Its Current Solutions ", Advances in Intelligent Systems and Computing, Vol. 2, 2020, pp. 467 -482.
J. Li, H. Yan, and Y. Zhang, " Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage ", IEEE Transactions on Services Computing, Vol. 14, No. 1, 2021, pp. 71 -81.
B. Venkateswarlu, and G. V. Soumya, " Large Scale Data Storage and Retrieval System using Keywords for E-governance", International Journal on Future Revolution in Computer Science & Communication Engineering, Vol. 3, No. 10, 2017, pp. 163 -168.
C. Chu, S. S. M. Chow, W. Tzeng, J. Zhou and R. H. Deng, " Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage ", IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, 2014, pp. 468 -477.
R. Veeravelli, " Data Sharing and Access Using Aggregate Key Concept", (M.S.) thesis, Department of Information Systems, St. Cloud State University, St. Cloud, United State, 2018
S. Somasundaram, "Online Data Sharing Using Cloud Computing", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 7, No. 4, 2019, pp. 2272 -2280.
R. Veeravelli, " Data Sharing and Access Using Aggregate Key Concept", (M.S.) thesis, Department of Information Systems, St. Cloud State University, St. Cloud, United State, 2018.
O.N. Akande, O.C. Abikoye, A.A Kayode., O.T.Aro, and O.R Ogundokun, A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security, Cham: Computational Science and Its Applications – ICCSA 2020 Springer, 2020.
A. H. Kami, and Q. A. Hamad, " Achieve Data Security in Cloud Computing ", International Journal of Advances in Computer Science and Technology, Vol. 6, No. 11, 2017, pp. 25 -29.
B.V.Varshini, M.Vigilson Prem and J.Geethapriya, “A Review on Secure Data Sharing in Cloud Computing Environment” , International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol 6, no 3, 2017, pp. 224- 228.
Indumathi Saikumar. DES- Data Encryption Standard. IRJET [Internet]. 2017 Mar [cited 2021 Apr 21]; 4(3): 1777-1782. Available from: https://www.irjet.net/archives/V4/i3/IRJET-V4I3489.pdf
I. Sumartono, and A. U. Siahaan, "Encryption of DES Algorithm in Information Security", International Journal for Innovative Research In Multidisciplinary Field, Vol. 4, No. 10, 2018, pp. 264 -274.
Guidelines on cryptographic algorithms usage and key management, Brussels: European Payments Council (EPC) AISBL, 2021.
Rasna, I. Matdoan, and S. N. Alam, " Comparison of Security Signing Data Authentication Integrity in Combination of Digest And AES Message Algorithm ", International Journal of Informatics and Information System, Vol. 4, No. 1, 2021, pp. 1 -12.
A. Purwinarko, and W. Hardyanto, " A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications ", Scientific Journal of Informatics, Vol. 5, No. 1, 2018, pp. 76 -80.
Cloud Computing and Security Research at UbiSeC Lab (University at Buffalo), “Privacy-assured and Effective Cloud Data Utilization,” Cloud Computing and Security Research at UbiSeC Lab. [Online]. Available: https://ubisec.cse.buffalo.edu/cloud/research2.html. [Accessed: Apr. 10, 2021].
Cloud Computing and Security Research at UbiSeC Lab (University at Buffalo), “Scalable and Owner-controlled Cloud Data Sharing,” Cloud Computing and Security Research at UbiSeC Lab. [Online]. Available: https://ubisec.cse.buffalo.edu/cloud/research3.html. [Accessed: Apr. 15, 2021].
Cloud Computing and Security Research at UbiSeC Lab (University at Buffalo), “Secure Data Computation Outsourcing in Cloud,” Cloud Computing and Security Research at UbiSeC Lab. [Online]. Available: https://ubisec.cse.buffalo.edu/cloud/research4.html. [Accessed: Apr. 25, 2021].
S. Phatangare, G. M. Bhandari, and Y. Sharma, " New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations ", International Journal of Innovative Technology and Exploring Engineering, Vol. 9, No. 5, 2020, pp. 545 -550.
C. Wang, K. Ren and J. Wang, " Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming ", IEEE Transactions on Computers, Vol. 65, No. 1, 2016, pp. 216 -229.
A. Venkatesh, and M. S. Eastaff, " A Study of Data Storage Security Issues in Cloud Computing ", Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 3, No. 1, 2018, pp. 1741 -1745.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Othman Atta Ismael

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
