Survey: Identity- Based Encryption in Cloud Computing

Size: px
Start display at page:

Download "Survey: Identity- Based Encryption in Cloud Computing"

Transcription

1 Survey: Identity- Based Encryption in Cloud Computing Madhavi Langute 1, H. A. Hingoliwala 2 1 M.E (Computer) Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune, India. Savitribai Phule Pune University, Pune, Maharashtra, India Professor (Computer) as Head of Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Pune, India. Savitribai Phule Pune University, Pune, Maharashtra, India Abstract: Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the overhead computation at private key generator (PKG).In this paper, going for survey on distinct method for handling the basic issue of Identity renouncement. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model. Keywords: Identity-based encryption (IBE), revocation, outsourcing, cloud computing 1. Introduction 2. Literature Survey Cloud storage means "the storage of data online in the cloud," where the data is put away in and available from different distributed and connected resources that compromise a cloud. However, the cloud storage is not completely trusted. Whether the data put away on cloud are in place or not turns into a significant concern of the clients. So to secure data and client Identity ; Identity Based Encryption (IBE) is an interesting option, which is proposed to streamline key administration in an authentication, based on Public Key Infrastructure (PKI) by utilizing humancoherent Identities (e.g., remarkable name, address, IP address, and so forth) as open keys. Along these lines, sender utilizing IBE does not have to gaze upward open key and authentication, however specifically scrambles message with recipient's Identities. As needs be, beneficiary getting the private key related with the comparing Identity from Private Key Generator (PKG) can decrypt such cipher text. In, Boneh and Franklin recommended that clients update their private keys intermittently and senders utilize the beneficiaries'. Identities connected with current time period. In any case, this mechanism would bring about an overhead load at PKG. In another word, every one of the clients paying little respect to whether their keys have been revoked or not, need to contact with PKG intermittently to demonstrate their Identities and redesign new private keys. It requires that PKG is online and the safe channel must be kept up for all exchanges, which will end up being a bottleneck for IBE framework as the quantity of clients develops of systems. In this paper, we bring outsourcing computation into IBE revocation, and formalize the security meaning of outsourced revocable IBE interestingly to the best of our knowledge. The accessibility of quick and dependable Digital Identities is a key element for the fruitful execution of the general population key base of the Internet. All computerized character plans must incorporate a technique for denying somebody's advanced character for the situation that this character is stolen (or wiped out) before its termination date (like the cancelation of a Master cards for the situation that they are stolen). In 1995, S. Micali proposed a rich strategy for personality denial which requires almost no correspondence in the middle of clients and varies in the framework. In this paper, we expand his plan by decreasing the general CA to Directory correspondence, while as yet keeping up the same minor client to seller correspondence. We differentiate our plan to different recommendations also. In this paper the author demonstrated that propose a completely utilitarian personality based encryption plan (IBE). The plan has picked cipher text security in the arbitrary prophet model accepting a variation of the computational Diffie- Hellman issue. Our framework depends on bilinear maps between gatherings. The Weil blending on elliptic bends is an illustration of such a guide. We give exact definitions for secure personality based encryption plans and give a few applications for such frameworks. In this paper [3] the author studied that the another kind of Identity-Based Encryption (IBE) plan that we call Fuzzy Personality Based Encryption. In Fuzzy IBE we see a way of life as set of illustrative qualities. A Fluffy IBE plan takes into account a private key for a personality,!, to unscramble a cipher text scrambled with a personality,!0, if and just if the characters! What s more, 0 are near one another as measured by the "set cover" separation metric. A Fuzzy IBE plan can be connected to empower encryption utilizing Paper ID: NOV

2 biometric inputs as personalities; the blunder resistance property of a Fuzzy IBE plan is correctly what takes into account the utilization of biometric personalities, which inalienably will have some commotion every time they are inspected. Moreover, we demonstrate that Fuzzy-IBE can be utilized for a sort of application that we term "quality based encryption". In this paper the author Consider a powerless customer that wishes to delegate calculation to an untrusted server and have the capacity to briefly confirm the accuracy of the outcome. We display conventions in two loose variations of this issue. We rst consider a model where the customer delegates the calculation to two or more servers, and is ensured to yield the right reply for whatever length of time that even a solitary server is straightforward. In this model, we demonstrate a 1- round measurably solid convention for any log-space uniform NC circuit. Interestingly, in the single server setting all known one-round concise designation conventions are computationally solid. The convention develops the arithemetiation systems of [Goldwasser-Kalai-Rothblum, STOC 08] and [Feige-Kilian, STOC 97]. Next we consider a implied perspective of the convention of [Goldwasser-Kalai- Rothblum, STOC 08] in the single-server model with a nonconcise, however open, oine stage. Utilizing this simplification we build two computationally stable conventions for appointment of calculation of any circuit C with profundity d and data length n, even a non-uniform one, such that the customer keeps running in time n poly(log(jcj); d). The rst convention is conceivably down to earth and less demanding to actualize for general calculations than the full convention of [Goldwasser-Kalai-Rothblum, STOC 08], and the second is a 1-round convention with comparative manysided quality, yet less client server. In this paper [5] the author addresses the issue of utilizing untrusted (possibly malevolent) cryptographic partners. We give a formal security definition to safely outsourcing calculations from a computationally constrained gadget to an untrusted partner. In our model, the ill-disposed environment composes the product for the partner, however then does not have direct correspondence with it once the gadget begins depending on it. Notwithstanding security, we likewise give a structure to measuring the effectiveness also; check ability of an outsourcing usage. We introduce two pragmatic outsource secure plans. In particular, we demonstrate to safely outsource measured exponentiation, which presents the computational bottleneck in most open key cryptography on computationally restricted gadgets. Without outsourcing, a gadget would require O (n) particular augmentations to complete particular exponentiation for n-bit types. The heap lessens to O(log2 n) for any exponentiation-based plan where the genuine gadget may utilize two untrusted exponentiation programs; we highlight the Cramer-Shoup cryptosystem and Schnorr marks as samples. With a casual thought of security, we accomplish the same burden diminishment for another CCA2-secure encryption plan utilizing stand out untrusted Cramer-Shoup encryption program. In this paper [6] the author demonstrated that the Trait based encryption (ABE) is a promising cryptographic apparatus for fine-grained access control. Be that as it may, the computational taken a toll in encryption ordinarily develops with the many-sided quality of access arrangement in existing ABE plans, which turns into a bottleneck constraining its application. In this paper, we formulize the novel worldview of outsourcing encryption of ABE to cloud administration supplier to calm neighbourhood calculation trouble. We propose an enhanced development with Map Reduce cloud which is secure under the suspicion that the expert hub and in addition at minimum one of the slave hubs is straightforward. In the wake of outsourcing, the computational taken a toll at client side amid encryption is decreased to inexact four exponentiations, which is steady. Another point of preference of the proposed development is that the client can assign encryption for any arrangement. In this paper [7] the author studied that the vast scale picture information sets are as a rule exponentially created today. Alongside such information blast is the quickly developing pattern to outsource the picture administration frameworks to the cloud for its rich processing assets and benefits. How-to ensure the delicate information while empowering outsourced picture administrations, be that as it may, turns into a noteworthy concern. To address these difficulties, we propose outsourced picture recuperation administration (OIRS), a novel outsourced picture recuperation administration construction modelling, which abuses diverse area advances and takes security, efficiency, and outline many-sided quality into thought from the earliest starting point of the administration. Specifically, we plan OIRS under the compacted detecting system, which is known for its effortlessness of binding together the conventional examining and pressure for picture securing. Information proprietors just need to outsource packed picture tests to cloud for lessened stockpiling overhead. What's more, in OIRS, information clients can tackle the cloud to safely reproduce pictures without uncovering data from either the compacted picture tests or the fundamental picture content. We begin with the OIRS plan for scanty information, which is the ordinary application situation for packed detecting, and after that demonstrate its common expansion to The general information for important trade-offs in the middle of efficiency and exactness. We altogether break down the security assurance of OIRS and behavior broad examinations to exhibit the framework viability and efficiency. For fulfillment, we additionally examine the normal execution speedup of OIRS through equipment assembled in framework outline. Framework viability and efficiency. For fulfillment, we additionally examine the normal execution speedup of OIRS through equipment assembled in framework outline. Paper ID: NOV

3 Sr. No International Journal of Science and Research (IJSR) Table 1: Survey Table Paper Name Technique Advantages Disadvantages Results 1 Fast Digital Identity Revocation 2 Certificate Revocation using Fine Grained Certificate Space Partitioning 3 QuasiModo: Efficient Certificate Validation and Revocation 4 Two Protocols for Delegation of Computation 5 Outsourcing Encryption of Attribute-Based Encryption with Map Reduce 6 Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud 3. Proposed Work Identity revocation certificate revocation System Tree based variant and NOVOMODO system round statistically sound protocol and arithemetization techniques Attribute-based encryption (ABE) graphic tool is used OIRS scheme is used for design the framework Better Efficient verification More efficient Method Improvement in relevant time and communication complexities easier to implement for general computations, less efficient computational cost at user side during encryption is reduced Secure and, efficient Infeasible to generate a signature not suitable In case of a distributed query answering system. Limited validity untrusted server and weak client complexity of access In secure data sensitive data while enabling outsourced image services The results were displayed that the proof from user to vendor of the validity of user's ID remains very small as per the micali method The result displays that right balance between CA to directory communication costs and query costs by carefully selecting the number Of partitions. A result displayed that the direct improvement in both the overall verification complexity, as well as the communication complexity, over previous Tree-based schemes. As extension of this protocol that somewhat reduces the workload Of the client at the price of a comparable increase in the number of rounds. The reducer executes reduce function on the set of intermediate pairs (k, v ) with the same key and outputs the final result The System effectiveness and efficiency and speedup of OIRS through hardware built-in system design. With the fast improvement of adaptable cloud administrations, it turns out to be progressively defenseless to utilize cloud administrations to share information in a companion circle in the distributed computing environment. Since it is not attainable to execute full lifecycle protection security, access control turns into a testing assignment, particularly when we share information on cloud servers. Keeping in mind the end goal to handle this issue, we propose time determined qualities, a novel secure information self-destructing plan in distributed computing. Though, prior the information would not get erased consequently from cloud. In proposed framework the information gets erased from the cloud and space is made. Figure 1.1: Architectural view of proposed system. In this proposed system User registration is done as well as login with valid credentials. After login user get the keys from key service provider based on identity. The user encrypt the file using the architectural view represents same key and upload it at cloud server. When the user gets removed from the organization then the revocation takes place and key gets updated to provide security. The self destructive scheme is implemented to delete the data or files automatically after completion of time span. 4. Conclusion In this paper, concentrating on the basic issue of character repudiation, we bring outsourcing calculation into IBE and propose a revocable plan in which the repudiation operations are assigned to CSP. With the guide of KU-CSP, the proposed plan is full-highlighted: 1) It accomplishes consistent productivity for both calculation at PKG and private key size at client; 2) User needs not to contact with PKG amid key update, as it were, PKG is permitted to be disconnected from the net after sending the denial rundown to KU-CSP; 3)No secure channel or client verification is required amid key-overhaul between client and KU-CSP. Paper ID: NOV

4 Moreover, we consider acknowledging revocable IBE under a more grounded enemy model. We exhibit a propelled development what's more, demonstrate to it is secure under RDoC model, in which in any event one of the KU-CSPs is thought to be completely forthright. In this manner, regardless of the possibility that a repudiated client and both of the KU-CSPs conspire, it can't to offer. References [1] W. Aiello, S. Oldham, and R. Ostrovsky, Fast digital identity revocation, in Advances in Cryptology (CRYPTO 98). New York, NY, USA: Springer, 1998, pp [2] D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in Advances in Cryptology (CRYPTO 01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp [3] A. Sahai and B. Waters, Fuzzy identity-based encryption, in Advances in Cryptology (EUROCRYPT 05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp [4] S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations, in Proc. 2nd Int. Conf. Theory Cryptography (TCC 05), 2005, pp [5] J. Li, C. Jia, J. Li, and X. Chen, Outsourcing encryption of attributebased encryption with mapreduce, in Information and Communications Security. Berlin, Heidelberg: Springer, 2012, vol. 7618, pp [6] B. Zhang, J. Wang, K. Ren, and C. Wang, Privacyassured Trans. Emerging Topics Comput., vol. 1, no. 1, p , Jul. Dec outsourcing of image reconstruction service in cloud, IEEE. [7] B. Zhang, J. Wang, K. Ren, and C. Wang, Privacyassured outsourcing of image reconstruction service in cloud, IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, p , Jul./Dec [8] A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp [9] C. Cocks, An identity based encryption scheme based on quadratic residues, in Cryptography and Coding, B. Honary, Ed. Berlin/ Heidelberg: Springer, 2001, vol. 2260, pp [10] R. Canetti, S. Halevi, and J. Katz, A forward-secure public-key encryption scheme, in Advances in Cryptology (EUROCRYPT 03),E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656, pp [11] D. Boneh and X. Boyen, Efficient selective-id secure identity-based encryption without random oracles, in Advances in Cryptology (EUROCRYPT 04), C. Cachin and J. Camenisch, Eds. Berlin,Germany: Springer, 2004, vol. 3027, pp [12] D. Boneh and X. Boyen, Secure identity based encryption without random oracles, in Advances in Cryptology (CRYPTO 04),M. Franklin, Ed. Berlin, Germany: Springer, 2004, vol. 3152, pp [13] B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology (EUROCRYPT 05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp [14] C. Gentry, Practical identity-based encryption without random oracles, in Advances in Cryptology (EUROCRYPT 06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp [15] C. Gentry, C. Peikert, and V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC 08), 2008, pp [16] S. Agrawal, D. Boneh, and X. Boyen, Efficient lattice (h)ibe in the standard model, in Advances in Cryptology (EUROCRYPT 10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp [17] D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, Bonsai trees, or how to delegate a lattice basis, in Advances in Cryptology (EUROCRYPT 10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp [18] Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, Identity-based hierarchical strongly key-insulated encryption and its application, in Advances in Cryptology (ASIACRYPT 05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp [19] D. Boneh, X. Ding, G. Tsudik, and C. Wong, A method for fast revocation of public key certificates and security capabilities, in Proc. 10th USENIX Security Symp., 2001, pp [20] B. Libert and J.-J. Quisquater, Efficient revocation and threshold pairing based cryptosystems, in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp [21] H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, Howto design space efficient revocable IBE from nonmonotonic ABE, in Proc. 6 th ACM Symp. Inf. Comput. Commun. Security (ASIACCS 11), 2011, pp [22] B. Libert and D. Vergnaud, Adaptive-id secure revocable identitybased encryption, in Topics in Cryptology (CT-RSA 09),M. Fischlin, Ed. Berlin, Germany: Springer, 2009, vol. 5473, pp [23] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS 10), 2010, pp [24] D. Chaum and T. P. Pedersen, Wallet databases with observers, in Proc. 12th Annu. Int. Cryptology Conf. Adv. Cryptology (CRYPTO 92), 1993, pp [25] M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, Secure outsourcing of scientific computations, in Trends in Software Engineering, M. V. Zelkowitz, Ed. New York, NY, USA: Elsevier, 2002,vol. 54, pp Author Profile Madhavi Langute, is pursuing M.E(Computer Engineering) From Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Hadapsar, affiliated to Savitribai Phule, Pune University, Pune, Maharashtra, India She received her B.E. (Computer Engineering) Degree from Pravra Rural Engineering College,Loni, affiliated to Savitribai Paper ID: NOV

5 Phule Pune University, Pune, Maharashtra, India Her area of interest is Cloud Computing, Data Mining & Networking. Prof. H.A. Hingoliwala, (Computer Science and Engineering). He is currently working as Professor as Head of Computer Department in Jayawantrao Sawant College of Engineering, Hadapsar, Pune, India , affiliated to Savitribai Phule Pune University, Pune, Maharashtra, India His area of interest is Wireless Sensor Network and Cloud computing etc Paper ID: NOV

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

A Survey on Outsourced Attribute-Based Encryption Technique

A Survey on Outsourced Attribute-Based Encryption Technique International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Survey on Outsourced Attribute-Based Encryption Technique Hadiya Rafiq Mir 1* and

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

Cloud Based Enterprise Resource Planning Using Software As A Service

Cloud Based Enterprise Resource Planning Using Software As A Service Cloud Based Enterprise Resource Planning Using Software As A Service Sujatha A1, Jayasudha R2, Prof Srinivasan. R3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Categorical Heuristic for Attribute Based Encryption in the Cloud Server Categorical Heuristic for Attribute Based Encryption in the Cloud Server R. Brindha 1, R. Rajagopal 2 1( M.E, Dept of CSE, Vivekanandha Institutes of Engineering and Technology for Women, Tiruchengode,

More information

Semi-Trusted Authentication for Health Data in Cloud

Semi-Trusted Authentication for Health Data in Cloud JOURNAL OF COMPUTER SCIENCE AND ENGINEERING Semi-Trusted Authentication for Health Data in Cloud Rajeswari.M 1, Anjelin Lilly Jasmine.P 2, V.Komaladevi 3, K.Monika 4 1 Assistant professor, 2,3,4 Students,

More information

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,

More information

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi

More information

How To Ensure Data Integrity In Cloud Storage

How To Ensure Data Integrity In Cloud Storage Decentralized Admittance Power with Flexible Distributed Storage Integrity Auditing Mechanism I G.Thenmozhi, II Dr.S.Dhanalakshmi I M.Phil Full Time Research Scholar, Dept. of Computer Science II Head

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure

More information

Decentralized Access Control Schemes for Data Storage on Cloud

Decentralized Access Control Schemes for Data Storage on Cloud Computer Science and Engineering 2016, 6(1): 1-6 DOI: 10.5923/j.computer.20160601.01 Decentralized Access Control Schemes for Data Storage on Cloud Shraddha V. Mokle *, Nuzhat F. Shaikh Department of Computer

More information

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.

More information

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data V.Abinaya PG Scholar Kalasalingam Institute of Technology Krishnankoil. V.Ramesh Assistant professor Kalasalingam

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption Bonfring International Journal of Research in Communication Engineering, Vol. 2, No. 3, September 2012 1 An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment

More information

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

Data defense in unpredictable Cloud Using Access Control and Access Time

Data defense in unpredictable Cloud Using Access Control and Access Time International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 12 December. 2013 PP.29-34 Data defense in unpredictable Cloud Using Access Control

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing. Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey

Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey Girish Department of PGS-CEA The National Institute of Engineering, Manadavady Road,Mysore-570008, INDIA Phaneendra

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai

More information

Review On Deduplicating Data and Secure Auditing in Cloud

Review On Deduplicating Data and Secure Auditing in Cloud Review On Deduplicating Data and Secure Auditing in Cloud Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD

SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD *Mrs.J.Sarojini Premalatha, **Mr.C.GopalaKrishnan, **Mrs.D.C.JOY WINNIE WISE, * M.E. (CSE), M.E.,Ph.D,Francis Xavier

More information

Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana

Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana Abstract In this project we intervened certificateless encryption plan without matching operations for

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Title Security Related Issues for Cloud Computing

Title Security Related Issues for Cloud Computing Title Security Related Issues for Cloud Computing Ashwini Singh Abstract: The term CLOUD implies Common Location Independent Online Utility on Demand. It's a rising innovation in IT commercial ventures.

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao

More information

Multi Layered Securing of Health Records using Public and Private Model in Cloud

Multi Layered Securing of Health Records using Public and Private Model in Cloud pp 97 102 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Multi Layered Securing of Health Records using Public and Private Model in Cloud Vijay J 1, Anitha C.L 2 1 P.G.Student,

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute

More information

Chosen-Ciphertext Security from Identity-Based Encryption

Chosen-Ciphertext Security from Identity-Based Encryption Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes

More information

Fine-Grained Access Control System based on Outsourced Attribute-based Encryption

Fine-Grained Access Control System based on Outsourced Attribute-based Encryption Fine-Grained Access Control System based on Outsourced Attribute-based Encryption Jin Li 1, Xiaofeng Chen 2, Jingwei Li 3, Chunfu Jia 3, Jianfeng Ma 4, Wenjing Lou 5 1 School of Computer Science and Educational

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department

More information

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Implementation of Data Sharing in Cloud Storage Using Data Deduplication Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling Surapriya Swain 1, Prof. Saurabh Gupta 2 1 Department of Computer Engineering, GSMCOE, Balewadi, Savitribai Phule

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices Ujjwala Bandawane 1, Sandeep Gore 2 1 G. H. Raisoni College of Engineering, Pune, Maharashtra, India

More information

Hey! Cross Check on Computation in Cloud

Hey! Cross Check on Computation in Cloud Hey! Cross Check on Computation in Cloud Ajeet Singh Rajput Computer Science and Engineering Department S.D.B.C.T, Mhow Road,Indore,(M.P), India ajeetsinghrajput@gmail.com M.E.(CSE), S.D.B.C.T, Indore

More information

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption Abstract: Charan 1, K Dinesh Kumar 2, D Arun Kumar Reddy 3 1 P.G Scholar, 2 Assistant Professor, 3 Associate Professor 1,2,3

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security V. Narasimha Swamy 1, K. Raja Shekar Reddy 2 1.M. Tech (CSE)., Srinivasa Institute of Technology & Science, Kadapa, Andhra

More information

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Secure Data Sharing in Cloud Computing using Hybrid cloud

Secure Data Sharing in Cloud Computing using Hybrid cloud International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Efficient Unlinkable Secret Handshakes for Anonymous Communications 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.307

More information

Trusted Public Auditing Process for Secure Cloud Storage

Trusted Public Auditing Process for Secure Cloud Storage Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com Identity Based Encryption Terence Spies VP Engineering terence@voltage.com Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems S.Palani 1 E.Sujith 2 Poun Kumar.V 3 Assistant Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri

More information

Experiments in Encrypted and Searchable Network Audit Logs

Experiments in Encrypted and Searchable Network Audit Logs Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: bhanprak@cisco.com Sashank Dara Cisco Systems

More information

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering

More information

On the Limits of Anonymous Password Authentication

On the Limits of Anonymous Password Authentication On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,

More information

Data Grid Privacy and Secure Storage Service in Cloud Computing

Data Grid Privacy and Secure Storage Service in Cloud Computing Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

Providing Data Protection as a Service in Cloud Computing

Providing Data Protection as a Service in Cloud Computing International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate

More information

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional

More information

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2

Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India

More information

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica

More information

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Keyword Search over Shared Cloud Data without Secure Channel or Authority Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department

More information

A study on keyword searchable frameworks for efficient data utilization in cloud storage

A study on keyword searchable frameworks for efficient data utilization in cloud storage A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information