Data Sharing in Cloud Computing by Using Steganography

Authors(4) :-Dhanush Shri Vardhan. R, Immanuel Xavier.N, Illavarasan. S, Aravindan. B

The important use of cloud computing is data sharing. However, security is always an issue in cloud. So, in this paper we show the ways to share our data securely, efficiently, and flexibly in cloud storage. We create new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. One can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. The secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.

Authors and Affiliations

Dhanush Shri Vardhan. R
Computer Science and Engineering, Dhanalakshmi College Of Engineering, Chennai, Tamilnadu, India
Immanuel Xavier.N
Computer Science and Engineering, Dhanalakshmi College Of Engineering, Chennai, Tamilnadu, India
Illavarasan. S
Computer Science and Engineering, Dhanalakshmi College Of Engineering, Chennai, Tamilnadu, India
Aravindan. B
Computer Science and Engineering, Dhanalakshmi College Of Engineering, Chennai, Tamilnadu, India

patient-controlled encryption, data sharing, cloud storage, key-aggregate encryption

 [1] Beckham, J. (2011) The Top 5 Security Risks of Cloud Computing. Retrieved February17, 2012 from  http://blogs.cisco.com/smallbusiness/the-top-5- security-risks-of-cloud- computing/

[2] Y. Chen, V. Paxson, R. H. Katz, What’s New About Cloud Computing Security?, University of California, Berkeley, Technical Report No. UCB/EECS-2010-5, January 2010

[3] S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.-M. Yiu, “SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment,” Proc. 10th Int’l Conf. Applied Cryptography and Network Security (ACNS), vol. 7341, pp. 526-543, 2012.

[4] C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.

[5] R. Canetti and S. Hohenberger, “Chosen-Ciphertext Secure Proxy Re-Encryption,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 185-194, 2007.

[6] S.S.M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R.H. Deng, “Dynamic Secure Cloud Storage with Provenance,” Cryptography and Security, pp. 442-464, Springer, 2012.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 265-268
Manuscript Number : IJSRSET152280
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Dhanush Shri Vardhan. R, Immanuel Xavier.N, Illavarasan. S, Aravindan. B , " Data Sharing in Cloud Computing by Using Steganography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.265-268, March-April-2015. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET152280

Article Preview