Various Cloud Storage Services with Protected Denotative System By Using IBE Scheme

Authors(3) :-T. Jahnavi, Dr. K. Kirankumar, Dr. P. Pandarinath

An online complete customer mind determination to oversee customer communication and protests Identity-based encryption (IBE) could be an open key cryptosystem and takes out the strain of open key foundation (PKI) and declaration organization in standard open key settings. owing to the nonappearance of PKI, the denial downside could be a vital issue in IBE settings. numerous rescindable IBE plans are arranged concerning this issue. Recently, by implanting an outsourcing calculation procedure into IBE, Li et al. arranged a rescindable IBE subject with a key-refresh cloud benefit provider (KU-CSP). Be that as it may, their subject has 2 inadequacies. One is that the calculation and correspondence cost ar over past revocable IBE plans. the contrary detriment is the absence of quantifiability inside the feeling that the KU-CSP should keep a mystery cost for each client. inside the article, we have a tendency to propose a supplanting rescindable IBE topic with a cloud renouncement specialist (CRA) to determine the 2 deficiencies, in particular, the execution is impressively enhanced and furthermore, the CRA holds exclusively a framework mystery for every one of the clients. For security investigation, we show that the arranged subject is semantically secure underneath the decisional added substance Diffie-Hellman (DBDH) presumption. At last, we expand the arranged rescindable IBE topic to blessing a CRA-supported confirmation subject with period-constrained benefits for dealing with a larger than average scope of grouped cloud administrations.

Authors and Affiliations

T. Jahnavi
Student, Department of Computer Science and Engineering, Chalapathi Institute of Engineering and Technology, Guntur, India
Dr. K. Kirankumar
Associate Professor & HOD, Department of Computer Science And Engineering, Chalapathi Institute of Engineering and Technology, Guntur, India
Dr. P. Pandarinath
Professor & Principal, Chalapathi Institute of Engineering and Technology, Guntur, India

Encryption, Authentication, Cloud Computing, Outsourcing Computation, Revocation Authority.

  1. A Shamir, “Identity-based cryptosystems and signature schemes,” Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
  2. D Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001
  3. R Housley, W. Polk, W. Ford, and D. Solo, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” IETF, RFC 3280, 2002.
  4. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
  5. M. Naor and K. Nissim, “Certificate revocation and certificate update,” IEEE Journal on Selected Areas in Communications, vol. 18 , no. 4, pp. 561 - 570, 2000.
  6. S Micali, “Novomodo: Scalable certificate validation and simplified PKI management,” Proc. 1st Annual PKI Research Workshop, pp. 15-25, 2002.
  7. F. F. Elwailly, C. Gentry, and Z. Ramzan, “QuasiModo: Efficient certificate validation and revocation,” Proc. PKC’04, LNCS, vol. 2947, pp. 375-388, 2004.
  8. V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” Proc. Financial Cryptography, LNCS, vol. 4886, pp. 247-259, 2007.
  9. D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, “A Method for fast revocation of public key certificates and security capabilities,” Proc. 10th USENIX Security Symp., pp. 297-310. 2001

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 213-215
Manuscript Number : CSEIT183516
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

T. Jahnavi, Dr. K. Kirankumar, Dr. P. Pandarinath, "Various Cloud Storage Services with Protected Denotative System By Using IBE Scheme", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.213-215, May-June.2018
URL : http://ijsrcseit.com/CSEIT183516

Follow Us

Contact Us