Identity Based Encryption with Data Self Destruction in Revocable Cloud Environment

Authors(6) :-Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse

Concerning securing information, scattered limit is quickly changing into the system for decision. Scattered cut-off is rapidly changing into the framework for choice. Securing data remotely instead of locally boasts a collection of inclinations for both home and expert customers. Appropriated bind assigns "the most extraordinary of information online in the cloud", regardless, the left on putting away behind isn't totally trusted. Regardless of whether the instructive getting together away on cloud are or not changes into a massive worry of the customers moreover discover the chance to control changes into a troublesome business, especially when we share information on cloud servers. To manage this issue outsourcing Revocable IBE gets ready for skilled key period and key maintaining technique is accessible. Other than to revive the limit of cloud server to past what numerous would consider conceivable new secure information self-destructing structure in scattered figuring is utilized. In this framework, each figure contains (encoded report) is named with a period break. In the event that the qualities related with the figure content fulfill the keys discover the chance to structure and both the time minute is in the permitted time between times then the figure substance is decoded. After a client demonstrated end time the information at cloud server will be safely self-destructed.

Authors and Affiliations

Kalyani Jaltare
BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Asavari Bhusari
BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Samiksha Dangre
BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Shivali Hedau
BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Shruti Waghmare
BE Students, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Prof. D. B. Khadse
Assistant Professor, Department of Computer science and Engineering Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India

Cloud Computing, Self-Destruction, Identity Based Encryption (IBE), Revocation, Outsourcing.

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, "Identity-Based Encryption with Outsourced Revocation in Cloud Computing", in IEEE transactions on computers, vol. 64, no. 2, february 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," In Advances in Cryptology CRYPTO98). New York, NY, USA:Springer, 1998, pp. 137-152.
  3. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. 15thACMConf. Comput. Commun.Security (CCS08), 2008, pp. 417-426.
  4. D. Boneh and M. Franklin, "Identity-based encryp-tion from the Weilpairing," in Advances in Cryptology CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  5. A. Sahai and B. Waters, "Fuzzy identity-based encryption,"in Advances in Cryptology (EUROCRYPT?05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  6. J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryp-tion of attribute based encryption with mapreduce," in Information and Communications Security. Berlin, Heidel-berg:Springer, 2012, vol. 7618, pp. 191-201.
  7. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacy-assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166-177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud," IEEE.
  8. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, "Fine-grained access control system based on outsourced attribute-based encryption," in Proc. 18th Eur. Symp. Res. Comput. Secu-rity (ESORICS), 2013,pp. 592-609.
  9. R. Canetti, S. Halevi, and J. Katz, "A forward-secure publickey Encryption scheme," in Advances in Cryptology (EUROCRYPT'03), E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656,pp. 646-646.
  10. P. Mell and T. Grance, "The NIST Definition of Cloud Computing," Nat. Inst. Stand. Technol., Tech. Rep. SP 800- 145, 2011.
  11. C. Wang, K. Ren, and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2011, pp. 820–828.
  12. M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. 20th USENIX Conf. Security (SEC?11), 2011, pp. 34–34.
  13. B. Waters, "Efficient identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT?05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 114–127.
  14. C. Gentry, "Practical identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT?06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp. 445–464.
  15. C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC?08), 2008, pp. 197–206.
  16. S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (h)ibe in the standard model," in Advances in Cryptology (EUROCRYPT?10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp. 553–572.
  17. D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, "Bonsai trees, or how to delegate a lattice basis," in Advances in Cryptology (EUROCRYPT?10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp. 523–552
  18. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology (ASIACRYPT?05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp. 495–514.
  19. D. Boneh, X. Ding, G. Tsudik, and C. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. 10th USENIX Security Symp., 2001, pp. 297–308.
  20. B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp. 163–171.
  21. H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, "How to design space efficient revocable IBE from nonmonotonic ABE," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS?11), 2011, pp. 381–385.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 733-739
Manuscript Number : CSEIT1833318
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse, "Identity Based Encryption with Data Self Destruction in Revocable Cloud Environment", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.733-739, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833318

Follow Us

Contact Us