Identity Based Encryption with Data Self Destruction in Revocable Cloud Environment

Authors

  • Kalyani Jaltare  BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Asavari Bhusari  BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Samiksha Dangre  BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Shivali Hedau  BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Shruti Waghmare  BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Prof. D. B. Khadse  Assistant Professor, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Self-Destruction, Identity Based Encryption (IBE), Revocation, Outsourcing.

Abstract

Concerning securing information, scattered limit is quickly changing into the system for decision. Scattered cut-off is rapidly changing into the framework for choice. Securing data remotely instead of locally boasts a collection of inclinations for both home and expert customers. Appropriated bind assigns "the most extraordinary of information online in the cloud", regardless, the left on putting away behind isn't totally trusted. Regardless of whether the instructive getting together away on cloud are or not changes into a massive worry of the customers moreover discover the chance to control changes into a troublesome business, especially when we share information on cloud servers. To manage this issue outsourcing Revocable IBE gets ready for skilled key period and key maintaining technique is accessible. Other than to revive the limit of cloud server to past what numerous would consider conceivable new secure information self-destructing structure in scattered figuring is utilized. In this framework, each figure contains (encoded report) is named with a period break. In the event that the qualities related with the figure content fulfill the keys discover the chance to structure and both the time minute is in the permitted time between times then the figure substance is decoded. After a client demonstrated end time the information at cloud server will be safely self-destructed.

References

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, "Identity-Based Encryption with Outsourced Revocation in Cloud Computing", in IEEE transactions on computers, vol. 64, no. 2, february 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," In Advances in Cryptology CRYPTO98). New York, NY, USA:Springer, 1998, pp. 137-152.
  3. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. 15thACMConf. Comput. Commun.Security (CCS08), 2008, pp. 417-426.
  4. D. Boneh and M. Franklin, "Identity-based encryp-tion from the Weilpairing," in Advances in Cryptology CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  5. A. Sahai and B. Waters, "Fuzzy identity-based encryption,"in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  6. J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryp-tion of attribute based encryption with mapreduce," in Information and Communications Security. Berlin, Heidel-berg:Springer, 2012, vol. 7618, pp. 191-201.
  7. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacy-assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166-177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud," IEEE.
  8. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, "Fine-grained access control system based on outsourced attribute-based encryption," in Proc. 18th Eur. Symp. Res. Comput. Secu-rity (ESORICS), 2013,pp. 592-609.
  9. R. Canetti, S. Halevi, and J. Katz, "A forward-secure publickey Encryption scheme," in Advances in Cryptology (EUROCRYPT'03), E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656,pp. 646-646.
  10. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," Nat. Inst. Stand. Technol., Tech. Rep. SP 800- 145, 2011.
  11. C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2011, pp. 820–828.
  12. M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. 20th USENIX Conf. Security (SEC‟11), 2011, pp. 34–34.
  13. B. Waters, "Efficient identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 114–127.
  14. C. Gentry, "Practical identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT‟06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp. 445–464.
  15. C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC‟08), 2008, pp. 197–206.
  16. S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (h)ibe in the standard model," in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp. 553–572.
  17. D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, "Bonsai trees, or how to delegate a lattice basis," in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp. 523–552
  18. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology (ASIACRYPT‟05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp. 495–514.
  19. D. Boneh, X. Ding, G. Tsudik, and C. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. 10th USENIX Security Symp., 2001, pp. 297–308.
  20. B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp. 163–171.
  21. H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, "How to design space efficient revocable IBE from nonmonotonic ABE," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟11), 2011, pp. 381–385.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse, " Identity Based Encryption with Data Self Destruction in Revocable Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.733-739, March-April-2018.