Identity-Based Encryption with Outsourced Revocation in Cloud Computing

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 5, Issue 2, No 01, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: SIVARANJANI.J,Mr. C.MURUGANANDAM

Reference:IJCS-304

View PDF Format

Abstract

Cloud computing provides a simplest way of data sharing, it provides various benefits to the users. But directly outsourcing the shared data to the cloud server will bring security issues as the data may contain valuable information. Hence, it is necessary to place cryptographically enhanced access control on the shared data, named Identity-based encryption to build a practical data sharing system. when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. Thus, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which introducing the functionalities of user revocation and cipher text update simultaneously.

References

[1] Alexandra Boldyreva (Georgia institute of technology, Atlanta, GA, USA), Vipul Goyal (university of California at Los Angeles, CA, USA) and Virendra Kumar (Georgia institute of technology, Atlanta, GA, USA) “Identity-based encryption with efficient revocation” 2008.

[2] Chul Sur Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea, Youngho Park (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea), Sang UK Shin (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) Kyung Hyune Rhee (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) “Certificate-Based Proxy Reencryption for Public Cloud Storage 2013”.

[3] Mohan, Prakash, and Ravichandran Thangavel. “Resource Selection in Grid Environment Based on Trust Evaluation using Feedback and Performance.” American Journal of Applied Sciences 10.8 (2013): 924.

[4] Prakash, M., and T. Ravichandran. “An Efficient Resource Selection and Binding Model for Job Scheduling in Grid.” European Journal of Scientific Research 81.4 (2012): 450-458.

[5] Jin Li (School of Computer Science, Guangzhou University, Guangzhou, China),Wenjing Lou (Virginia Polytechnic Institute and State University, Blacksburg) “Identity based encryption with outsourced revocation in cloud computing” 2015.

[6] Prakash, M., R. Farah Sayeed, S. Princey, and S. Priyanka. “Deployment of MultiCloud Environment with Avoidance of DDOS Attack and Secured Data Privacy.” International Journal of Applied Engineering Research 10, no. 9 (2015): 8121-8124.

[7] Annamalai, R., J. Srikanth, and M. Prakash. “Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature.” International Journal of Computer Applications 114.12 (2015).


Keywords

Revocation, Encryption, Key Exchange, Private key generator, cipher text.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog