International Transaction of Electrical and Computer Engineers System
ISSN (Print): 2373-1273 ISSN (Online): 2373-1281 Website: Editor-in-chief: Dr. Pushpendra Singh, Dr. Rajkumar Rajasekaran
Open Access
Journal Browser
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18
DOI: 10.12691/iteces-3-1-2
Open AccessResearch Article

Cryptography during Data Sharing and Accessing Over Cloud

Shyam Nandan Kumar1,

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India

Pub. Date: March 17, 2015
(This article belongs to the Special Issue Special issue on Cryptography & Network Security)

Cite this paper:
Shyam Nandan Kumar. Cryptography during Data Sharing and Accessing Over Cloud. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):12-18. doi: 10.12691/iteces-3-1-2


Data sharing is an important functionality in cloud environment. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. In this article, an efficient methodology is provided to securely, efficiently, and flexibly share data with others in cloud computing. In this technique, the secret key holder can release a constant-size aggregate key for flexible choices of cipher-text set in cloud storage, but the other encrypted files outside the set remain confidential. Secure cryptographic architecture and working methodology are proposed in this paper for optimal services over the cloud.

cloud computing data sharing decryption encryption

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


[1]  L. Hardesty, “Secure computers aren’t so secure,” MIT press, 2009,
[2]  D. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”. Proceedings of the IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
[3]  D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano. “Public key encryption with keyword search”. Advances in Cryptology-EUROCRYPT'04, 2004, LNCS 3027, Springer, pp. 506-522.
[4]  V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89-98.
[5]  M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conference on Computer and Communications Security, 2009, pp. 121-130.
[6]  S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology-AFRICACRYPT 2010, ser. LNCS, vol. 6055. Springer, 2010, pp. 316-332.
[7]  G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1-30, 2006.
[8]  Seung-Hyun Seo, Nabeel, M, Bertino, E. and Xiaoyu Ding, “An Efficient Certificateless Encryption for Secure Data Sharing in Public CloudsIEEE Transactions on Knowledge and Data Engineering, Volume: 26, Issue: 9, pp. 2107-2119, 05 August 2013
[9]  Ruhr (2011) “Cloud computing: Gaps in the cloud”. NewsRx Health Sci.
[10]  D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,” in Proceedings of Advances in Cryptology-CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258-275.