Implementation of Identity Based Encryption with Outsourced User Revocation in Cloud Computing

Authors

  • Nikita S. Khadse  B.Tech, Department of Computer Science and Engineering, G. H. Raisoni University, Nagpur, Maharashtra, India
  • Suraj P. Mate  B.Tech, Department of Computer Science and Engineering, G. H. Raisoni University, Nagpur, Maharashtra, India
  • Yash R. Goda  B.Tech, Department of Computer Science and Engineering, G. H. Raisoni University, Nagpur, Maharashtra, India
  • Prof. Jayshri Harde  Assistant Professor, Department of Computer Science and Engineering, G. H. Raisoni University, Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Self-Destruction, Identity Based Encryption (IBE), Revocation, Outsourcing.

Abstract

As far as information is concerned, centralized storage rapidly turns into the decision-making technique. Distributed storage quickly becomes the preferred process. The remote securing of data is a different kind of inclination for home and expert users, rather than locally. Distributed storage means "the power of the cloud online information," although distributed storage is not completely reliable as it should be. No matter whether the information on the cloud is or is not turned into a major concern for clients, it also becomes a troubled task , particularly when we share information on cloud servers. To handle this issue outsourcing Revocable IBE conspires for proficient key era and key refreshing procedure is present. Additionally to enhance the proficiency of cloud server as far as capacity new secure information self-destructing framework in distributed computing is utilized. In this framework, each figure contains (encoded document) is named with a period interim. In the event that the characteristics related with the figure content fulfill the key’s get to structure and both the time moment is in the permitted time interim then the figure content is decoded. After a client indicated end time the information at cloud server will be safely self-destructed

References

  1. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, “Identity-Based Encryption with Outsourced Revocation in Cloud Computing”, in IEEE transactions on computers, vol. 64, no. 2, february 2015.
  2. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” In Advances in Cryptology CRYPTO98). New York, NY, USA:Springer, 1998, pp. 137-152.
  3. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. 15thACMConf. Comput. Commun.Security (CCS08), 2008, pp. 417-426.
  4. D. Boneh and M. Franklin, “Identity-based encryp-tion from the Weilpairing,” in Advances in Cryptology CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  5. A. Sahai and B. Waters, “Fuzzy identity-based encryption,”in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  6. J. Li, C. Jia, J. Li, and X. Chen, “Outsourcing encryp-tion of attribute based encryption with mapreduce,” in Information and Communications Security. Berlin, Heidel-berg:Springer, 2012, vol. 7618, pp. 191-201.
  7. B. Zhang, J. Wang, K. Ren, and C. Wang, “Privacy-assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166-177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud,” IEEE.
  8. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained access control system based on outsourced attribute-based encryption,” in Proc. 18th Eur. Symp. Res. Comput. Secu-rity (ESORICS), 2013,pp. 592-609.
  9. R. Canetti, S. Halevi, and J. Katz, “A forward-secure publickey Encryption scheme,” in Advances in Cryptology (EUROCRYPT'03), E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656,pp. 646-646.
  10. P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Nat. Inst. Stand. Technol., Tech. Rep. SP 800- 145, 2011.
  11. C. Wang, K. Ren, and J. Wang, “Secure and practical outsourcing of linear programming in cloud computing,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2011, pp. 820–828.
  12. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE ciphertexts,” in Proc. 20th USENIX Conf. Security (SEC‟11), 2011, pp. 34–34.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Nikita S. Khadse, Suraj P. Mate, Yash R. Goda, Prof. Jayshri Harde "Implementation of Identity Based Encryption with Outsourced User Revocation in Cloud Computing" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 2, pp.428-433, November-December-2021.