Secure Data Sharing in Cloud Computing using Revocable-Storage Identity-Based Encryption

Authors

  • Rutu Manmode  Department of Computer Science and Engineering, G. H. Raisoni College of Engineering and Technology, Wadi, Nagpur, Maharashtra, India
  • Hemlata Dakhore  Department of Computer Science and Engineering, G. H. Raisoni College of Engineering and Technology, Wadi, Nagpur, Maharashtra, India

Keywords:

Revocation, Encryption, Key Exchange, Private Key Generator, Cipher Text.

Abstract

The Cloud computing gives a least difficult method for information sharing, it gives different advantages to the clients. Be that as it may, specifically outsourcing the mutual information to the cloud server will bring security issues as the information which may contain profitable data. Hence, it is necessary to place cryptographically enhanced access control on the shared data, named Identity-based encryption to build a practical data sharing system. when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. Thus, we propose a notion called revocable-capacity identity based encryption (RS-IBE), which introducing the functionalities of user revocation and cipher text update simultaneously

References

  1. Alexandra Boldyreva (Georgia institute of technology, Atlanta, GA, USA), Vipul Goyal (university of California at Los Angeles, CA, USA) and Virendra Kumar (Georgia institute of technology, Atlanta, GA, USA) "Identity-based encryption with efficient revocation" 2008.
  2. Chul Sur Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea, Youngho Park (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea), Sang UK Shin (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) Kyung Hyune Rhee (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) "Certificate-Based Proxy Reencryption for Public Cloud Storage 2013".
  3. Mohan, Prakash, and Ravichandran Thangavel. "Resource Selection in Grid Environment Based on Trust Evaluation using Feedback and Performance." American Journal of Applied Sciences 10.8 (2013): 924.
  4. Prakash, M., and T. Ravichandran. "An Efficient Resource Selection and Binding Model for Job Scheduling in Grid." European Journal of Scientific Research 81.4 (2012): 450-458.
  5. Jin Li (School of Computer Science, Guangzhou University, Guangzhou, China),Wenjing Lou (Virginia Polytechnic Institute and State University, Blacksburg) "Identity based encryption with outsourced revocation in cloud computing" 2015.
  6. Prakash, M., R. Farah Sayeed, S. Princey, and S. Priyanka. "Deployment of MultiCloud Environment with Avoidance of DDOS Attack and Secured Data Privacy." International Journal of Applied Engineering Research 10, no. 9 (2015): 8121-8124.
  7. Annamalai, R., J. Srikanth, and M. Prakash. "Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature." International Journal of Computer Applications 114.12 (2015).
  8. Mohan Prakash, Chelliah Saravanakumar. "An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password", International Journal of Information Security and Privacy, 11(2), 1-10, 2017.
  9. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy preserving public auditing for secure cloud storage,"2013.
  10. G. Anthes, "Security in the cloud," Communications of the ACM, 2010
  11. S. Ruj, M. Stojmenovic, and A. Nayak, s"Decentralized access control with anonymous authentication of data stored in clouds" 2014
  12. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, "Cost-effective authentic and anonymous data sharing with forward security" 2014.
  13. C. Gentry, "Certificate-based encryption and the certificate revocation problem," 2003.
  14. V. Goyal, "Certificate revocation using fine grained certificate space partitioning," 2007.
  15. J. M. G. Nieto, M. Manulis, and D. Sun, "Forward-secure hierarchical predicate encryption,"2013.
  16. K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, "An efficient cloud based revocable identity-based proxy reencryption scheme for public clouds data sharing," 2014.
  17. D.-H. Phan, D. Pointcheval, S. F. Shahandashti, and M. Strefler, "Adaptive cca broadcast encryption with constant-size secret keys and ciphertexts," 2013.
  18. M. Abdalla and L. Reyzin, "A new forward-secure digital signature scheme," 2000.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Rutu Manmode, Hemlata Dakhore, " Secure Data Sharing in Cloud Computing using Revocable-Storage Identity-Based Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1521-1527, January-February-2018.