Secure Operations of Cloud Email System by Using Contingent ID-Based Transmission Proxy Double-Encryption Technique

Authors(2) :-Dr. Mohammed Abdul Waheed, Vrushabha Lingaraja

Firstly, various expanded Proxy Re-Encryptions (PRE), e.g. Contingent (CPRE), ID-based PRE (IPRE) and communicate PRE (BPRE), have been proposed for adaptable applications. By joining CPRE, IPRE and BPRE, this paper proposes an adaptable primitive alluded to as contingent ID-based communicate double encryption and formalizes its semantic security. New proposed system enables a sender to scramble a message to numerous recipients by indicating these receiver’s personalities, and the sender can assign a re-encryption key to an intermediary/proxy with the goal that he can change over the underlying Cipher-Text into another one to another set of planned collectors. In addition, the re-encryption key can be related with a condition to such an extent that only the coordinating Cipher-Texts can be re-scrambled, which enables the first sender to authorize get to control over his remote Cipher-Texts in a fine-grained way. We propose an effective system conspire with provable security. In the instantiated plot, the underlying Cipher-Text, the re-encoded Cipher-Text and the re-encryption enter are all in consistent size, and the parameters to produce a re-encryption key are autonomous of the first recipients of any underlying Cipher-Text. At last, we demonstrate a utilization of our proxy double encryption to secure cloud email framework profitable over existing secure email frameworks in view of Pretty Good Privacy convention or personality based encryption.

Authors and Affiliations

Dr. Mohammed Abdul Waheed
Department of Studies in Computer Science and Engineering,Visvesvaraya Technological University, CGPS, Kalaburagi, Karnataka, India
Vrushabha Lingaraja
Department of Studies in Computer Science and Engineering,Visvesvaraya Technological University, CGPS, Kalaburagi, Karnataka, India

Proxy Double-Encryption, Cloud Storage, Identity-Based Encryption, Broad Cast Encryption, Secure Cloud Email

  1. J. Shao, G.Wei,Y.Ling, and M.Xie, "Identity-based conditional proxyre-encryption,"inProc.IEEEInt.Conf.Commun.,2011,pp.1–5.
  2. MAN HO AU, JOSEPH K. LIU, WILLY SUSILO, DUNCAN S. WONG, GUOMIN YANG, TRAN VIET XUAN PHUONG, QI XIE, "A DFA- BASED
  3. K.Liang,Z.Liu, X.Tan, D.S.Wong, and C.Tang, "ACCA-secure identity- based Conditional proxy re-encryption without random oracles," inProc.15thInt.Conf.Inf. SecurityCryptol.,2012, pp.231–146.
  4. Cecile Delerablée "Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys"
  5. D. BONEH AND X. BOYEN "SECURE IDENTITY BASED ENCRYPTION WITHOUT RANDOM ORACLES"

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 344-347
Manuscript Number : CSEIT172455
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. Mohammed Abdul Waheed, Vrushabha Lingaraja, "Secure Operations of Cloud Email System by Using Contingent ID-Based Transmission Proxy Double-Encryption Technique", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.344-347, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT172455

Article Preview

Follow Us

Contact Us