An Efficient Certificate Less Encryption for Secure Data Sharing In Public Clouds

Authors

  • D. Sudha  Assistant Professor, Department of Computer Science A.V.C College, Mayiladuthurai, Tamil Nadu, India
  • D. Nandhini  Research Scholar, Department of Computer Science A.V.C College, Mayiladuthurai, Tamil Nadu, India

Keywords:

Secure Data Sharing, Public Key Encryption, mCL-PKE scheme, Access Control Policy, Secure Decryption

Abstract

Mediated certificateless encryption scheme is proposed without pairing operations for securely sharing sensitive statistics in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identification based totally encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are both inefficient because of the usage of pricey pairing operations or inclined against partial decryption assaults. In order to deal with the overall performance and protection troubles, in this proposed work, first propose a mCL-PKE scheme without the usage of pairing operations. Apply mCL-PKE scheme to assemble a sensible solution to the trouble of sharing touchy facts in public clouds. The cloud is employed as a secure garage as well as a key generation middle. In this gadget, the statistics owner encrypts the sensitive records the use of the cloud generated users' public keys based totally on its get entry to manage rules and uploads the encrypted records to the cloud. Keys are generated using KP-ABE encryption scheme. Upon a success authorization, the cloud partially decrypts the encrypted data for the users. The users finally fully decrypt the partly decrypted records the usage of their personal keys. The confidentiality of the content and the keys is preserved with admire to the cloud, due to the fact the cloud cannot completely decrypt the facts. Additionally recommend an extension to the above technique to enhance the efficiency of encryption at the data proprietor. Here implement mCL-PKE scheme and the overall cloud based device, and compare its protection and performance. This effects show that proposed schemes are efficient and realistic.

References

  1. Shamir. Identity Based Cryptosystems and Signature Scheme. In Proc. of CRYPTO 1984, LNCS 196, Berlin: Springer-Verlag, 1984. pp. 47-53.
  2. S. Al-Riyami and K.G. Paterson. Certificateless Public Key Cryptography. In proc. of ASIACRYPTO 2003, LNCS 2894, Berlin: Springer-Verlag, 2003. pp. 452-473.
  3. Libert and J. Quisquater. Efficient revocation and threshold pairing based cryptosystems. PODC 2003. Boston, Massachusetts. 2003. pp.163-171.
  4. S. Al-Riyami and K.G. Paterson. CBE from CLPKE: A Generic Construction and Efficient Schemes. In Proc. of PKC 2005, LNCS 3386, Berlin: Springer- Verlag, 2005. pp. 398-415.
  5. Baek, R, Safavi-Nani and W. Susilo. Certificateless Public Key Encryption without Pairing. In Proc. ISC 2005, LNCS 3650, Berlin: Springer-Verlag, 2005. pp. 134-148.
  6. Shi and J. Li. Provable Efficient Certificateless Public Key Encryption. Cryptology eprint Archive, Report.http://eprint.iacr.org/2005/287.
  7. S. Ju, D. Y. Kim, and D. H. Lee et al. Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. In Proc. of KES 2005, LNAI 3682, Berlin: Springer-Verlag, 2005. pp. 453-459.
  8. Huang, W. Susilo and Y. Mu et al. On the Security of Certificateless Signature Schemes from Asiacrypto 2003. In Proc. of CANS 2005, LNCS 3810, Berlin: Springer-Verlag, 2005. pp. 13-25.
  9. Li, K. Chen and L. Sun. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal, vol 45, pp. 76-83, Springer-Verlag, 2005.
  10. Boneh, X. Ding, G. Tsudik, and C. Wong. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In Proc. of the 10th USENIX Security Symposium, Washington D. C., 2001. pp. 297-308.

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
D. Sudha, D. Nandhini, " An Efficient Certificate Less Encryption for Secure Data Sharing In Public Clouds, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.218-227, September-October-2018.