Publication Type : Journal Article
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015
Source : Computational Intelligence, Cyber Security and Computational Models,Volume 412 of the series Advances in Intelligent Systems and Computing, pp. 385-392, 2016.
Url : http://dx.doi.org/10.1007/978-981-10-0251-9_36
ISBN : 9789811002519
Campus : Coimbatore
School : Centre for Cybersecurity Systems and Networks, School of Engineering
Center : TIFAC CORE in Cyber Security
Department : Computer Science, Mathematics, cyber Security
Year : 2016
Abstract : Cloud file sharing is a topic that has been in top flight for a long period of time and even in near future. Many methods like access control lists, attribute based encryption, identity based encryption and proxy re-encryption were introduced for sharing data stored in a cloud. But their drawbacks lead to the introduction of key aggregation based file sharing where the content provider generates an aggregate key based on files to be shared and distribute it among the users. Even though this mechanism is very much effective, it has the drawback that if once a user gets an aggregate key corresponding to a set of files from the data owner, then the data owner cannot revoke the permission for accessing the updated files to the user, who already possess the aggregate key. Our scheme in this paper provides an extension to this existing work which guarantees a dynamic generation of the aggregate key and thereby will not allow any unauthorised access to the updated files in the cloud.
Cite this Research Publication : M. James, Srinivasan, C., K.V., L., and Sethumadhavan, M., “Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation”, in Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015, M. Senthilkumar, Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., and Batten, L., Eds. Singapore: Springer Singapore, 2016, pp. 385–392.