IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS

Journal Title: International journal of research -GRANTHAALAYAH - Year 2017, Vol 5, Issue 4

Abstract

Identity-based encryption (IBE) is a public key cryptosystem(encoding and decoding) and eliminates the demands of public key infrastructure(PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, a revocable IBE scheme with a key-update cloud service provider (KU-CSP) was proposed. However, their scheme has two shortcomings. One is that the computation and communication costs are higher than previous revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU-CSP must keep a secret value for each user. In the article, we propose a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. Finally, we extend the proposed revocable IBE scheme to present a CRA-aided authentication scheme with periodlimited privileges for managing a large number of various cloud services.

Authors and Affiliations

Keywords

Related Articles

REAL POWER LOSS REDUCTION BY ENRICHED GENETIC ALGORITHM

In this paper, Enriched Genetic Algorithm (EGA) utilized to solve reactive power optimization problem. In the proposed algorithm Stochastic Universal Selection (SS) is utilized to improve the selection procedure. The sel...

CASE REPORT: ACUPUNCTURE TREATMENT IN MALE PATIENT WITH PRIMARY HYPOTHYROIDISM

The thyroid gland controls the metabolism in the human body. In primary hypothyroidism, the thyroid is being stimulated properly but it isn’t able to produce enough thyroid hormones for the body to function properly. Thi...

MEASURING CUSTOMERS’ ATTITUDE TOWARDS INNOVATIVE BANKING SERVICES OF PUBLIC AND PRIVATE SECTOR IN TIRUNELVELI DISTRICT

The beginning of empowerment of banking customers for their own transactions started with the evolution of ATMs as a delivery channel. The emergence of innovative banking services such as Self Service Banking Technologie...

PERFORMANCE ANALYSIS OF CLASSIFICATION ALGORITHM ON DIABETES HEALTHCARE DATASET

Healthcare industry collects huge amount of unclassified data every day. For an effective diagnosis and decision making, we need to discover hidden data patterns. An instance of such dataset is associated with a group of...

AGGRESSIVE NATURE OF WOMEN IN THE NOVELS OF ANITA NAIR

This paper seeks to focus primarily on the psychological exploration of inner mind of Indian women in the novels written by an Indian writer in English. There is a need and relevance to dwell briefly on some of the novel...

Download PDF file
  • EP ID EP206739
  • DOI 10.5281/zenodo.572292
  • Views 127
  • Downloads 0

How To Cite

(2017). IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS. International journal of research -GRANTHAALAYAH, 5(4), 38-40. https://europub.co.uk./articles/-A-206739