Key-Aggregate Searchable Encryption ( KASE ) For Group Data Sharing via Cloud Storage

@inproceedings{OORNIMA2016KeyAggregateSE,
  title={Key-Aggregate Searchable Encryption ( KASE ) For Group Data Sharing via Cloud Storage},
  author={G. P OORNIMA and S. S WETHA},
  year={2016}
}
  • G. P OORNIMA, S. S WETHA
  • Published 2016
The implied need for secure conversation, storage, and complexity clearly renders the procedure impractical. In this paper, we address this useful hindrance, which is essentially uncared for within the literature, by using proposing the novel suggestion of key aggregate searchable encryption (KASE) and instantiating the notion through a concrete KASE scheme, wherein an information proprietor handiest needs to distribute a single key to a consumer for sharing a big quantity of records, and the… CONTINUE READING
Highly Cited
This paper has 71 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 36 extracted citations

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things

IEEE Transactions on Industrial Informatics • 2018
View 15 Excerpts
Highly Influenced

Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage

2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC) • 2017
View 4 Excerpts
Highly Influenced

Group Data Sharing for Multi owner Using Single Key Aggregation Prof

Ajay K. Gupta, M. Jayashree, Miss. More Kajal, Miss. Nanekar Sonali
2017
View 3 Excerpts
Highly Influenced

The security cloud storage auditing with key generation using ABE — An implementation

2017 2nd International Conference on Communication and Electronics Systems (ICCES) • 2017
View 3 Excerpts
Highly Influenced

72 Citations

0204020152016201720182019
Citations per Year
Semantic Scholar estimates that this publication has 72 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 26 references

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

IEEE Transactions on Parallel and Distributed Systems • 2012
View 6 Excerpts
Highly Influenced

The NIST definition of cloud computing

P. Mell, T. Grance
NISTspecial publication, 800(145): 7, 2011. • 2011
View 1 Excerpt

Orderpreserving symmetricencryption

A. Boldyreva, N. Chenette, Y. Lee
Advances in Cryptology- EUROCRYPT, 2009. SpringerBerlin Heidelberg, pp. 224- 241, 2009. • 2009
View 1 Excerpt

Payment processor breach may be largest ever,”http://voices.washingtonpost.com/securityfix/2009/01/p ayment processor breach mayb

B. Krebs
2009

Confidentialitypreservingrank-ordered search

A. Swaminathan, Y. Mao, G.-M Su
Proceedings of the 2007 ACM workshop onStorage security and survivability. ACM, pp. 7-12, 2007. • 2007

Similar Papers

Loading similar papers…