Secure Operations of Cloud Email System by Using Contingent ID-Based Transmission Proxy Double-Encryption Technique

Authors

  • Dr. Mohammed Abdul Waheed  Department of Studies in Computer Science and Engineering,Visvesvaraya Technological University, CGPS, Kalaburagi, Karnataka, India
  • Vrushabha Lingaraja  Department of Studies in Computer Science and Engineering,Visvesvaraya Technological University, CGPS, Kalaburagi, Karnataka, India

Keywords:

Proxy Double-Encryption, Cloud Storage, Identity-Based Encryption, Broad Cast Encryption, Secure Cloud Email

Abstract

Firstly, various expanded Proxy Re-Encryptions (PRE), e.g. Contingent (CPRE), ID-based PRE (IPRE) and communicate PRE (BPRE), have been proposed for adaptable applications. By joining CPRE, IPRE and BPRE, this paper proposes an adaptable primitive alluded to as contingent ID-based communicate double encryption and formalizes its semantic security. New proposed system enables a sender to scramble a message to numerous recipients by indicating these receiver’s personalities, and the sender can assign a re-encryption key to an intermediary/proxy with the goal that he can change over the underlying Cipher-Text into another one to another set of planned collectors. In addition, the re-encryption key can be related with a condition to such an extent that only the coordinating Cipher-Texts can be re-scrambled, which enables the first sender to authorize get to control over his remote Cipher-Texts in a fine-grained way. We propose an effective system conspire with provable security. In the instantiated plot, the underlying Cipher-Text, the re-encoded Cipher-Text and the re-encryption enter are all in consistent size, and the parameters to produce a re-encryption key are autonomous of the first recipients of any underlying Cipher-Text. At last, we demonstrate a utilization of our proxy double encryption to secure cloud email framework profitable over existing secure email frameworks in view of Pretty Good Privacy convention or personality based encryption.

References

  1. J. Shao, G.Wei,Y.Ling, and M.Xie, "Identity-based conditional proxyre-encryption,"inProc.IEEEInt.Conf.Commun.,2011,pp.1–5.
  2. MAN HO AU, JOSEPH K. LIU, WILLY SUSILO, DUNCAN S. WONG, GUOMIN YANG, TRAN VIET XUAN PHUONG, QI XIE, "A DFA- BASED
  3. K.Liang,Z.Liu, X.Tan, D.S.Wong, and C.Tang, "ACCA-secure identity- based Conditional proxy re-encryption without random oracles," inProc.15thInt.Conf.Inf. SecurityCryptol.,2012, pp.231–146.
  4. Cecile Delerablée "Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys"
  5. D. BONEH AND X. BOYEN "SECURE IDENTITY BASED ENCRYPTION WITHOUT RANDOM ORACLES"

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Dr. Mohammed Abdul Waheed, Vrushabha Lingaraja, " Secure Operations of Cloud Email System by Using Contingent ID-Based Transmission Proxy Double-Encryption Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.344-347, July-August-2017.