Main Reference PaperKey-aggregate authentication cryptosystem for data sharing in dynamic cloud storage, Future Generation Computer Systems, 2018, [Java].
  • The scheme solves the secret-key leakage problem by setting up an effective identity authentication. The key-aggregate authentication cryptosystem (KAAC) scheme supports secure, efficient, and flexible data sharing via cloud storage. There is a limitation in this work that the size of the public system parameter has a linear relationship with the number of classes of ciphertext. Although this parameter can be downloaded with the ciphertexts, it would be better if its sizes are independent of the maximum number of ciphertext classes. Also, collusion between secret-key keeper and the cloud server should be considered. The cloud server may offer to permit downloads in exchange for the decryption power of the secret-key keeper.

Description
  • The scheme solves the secret-key leakage problem by setting up an effective identity authentication. The key-aggregate authentication cryptosystem (KAAC) scheme supports secure, efficient, and flexible data sharing via cloud storage. There is a limitation in this work that the size of the public system parameter has a linear relationship with the number of classes of ciphertext. Although this parameter can be downloaded with the ciphertexts, it would be better if its sizes are independent of the maximum number of ciphertext classes. Also, collusion between secret-key keeper and the cloud server should be considered. The cloud server may offer to permit downloads in exchange for the decryption power of the secret-key keeper.

  • To achieve efficient and secure data sharing in dynamic cloud storage must be stable in expense and leakage-resilient.

Aim & Objectives
  • To achieve efficient and secure data sharing in dynamic cloud storage must be stable in expense and leakage-resilient.

  • The KAAC scheme is considered to use in other scenarios such as patient-controlled encryption, searchable encryption through cloud storage.

Contribution
  • The KAAC scheme is considered to use in other scenarios such as patient-controlled encryption, searchable encryption through cloud storage.

  • Java Development Kit 1.8.0, MySQL 5.5.40. Cloudsim-4.0 with WorkflowSim-1.0.

  • Netbeans 8.0.1, J2SE.

Software Tools & Technologies
  • Java Development Kit 1.8.0, MySQL 5.5.40. Cloudsim-4.0 with WorkflowSim-1.0.

  • Netbeans 8.0.1, J2SE.

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit