A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context

  • Authors

    • Amish Singh
    • Saurabh Shukla
    • Sowmiya B
    https://doi.org/10.14419/ijet.v7i2.8.10462

    Received date: March 22, 2018

    Accepted date: March 22, 2018

    Published date: March 19, 2018

  • Pre-Authentication, Proxy Re-encryption, Identity-based encryption(IBE), Ciphertext.
  • Abstract

    This survey paper categorizes, compares, and summarizes the algorithms, data sets and performance measurement in the published articles related to proxy re-encryption and medical systems. Most of the systems either deploy a pre-authentication approach or a proxy re-encryption approach, they are seldom seen together. Most of the systems either take a patient -centric or a doctor-centric approach whereas the demand is for a common system that can be accessible to all access groups. Multi-data sharing is another concept that is necessary to be implemented in the newer systems and is lacking in many of them .The proposed system overcomes all these problems . It uses RSA for the pre authentication and AES algorithm to to perform pre authentication.

  • References

    1. K. R. M. Li, S. Yu and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”, Security and Privacy in Communication Networks, International ICST Conference, SECURECOMM, pp. 89–106, 2010.
    2. E. H. J. Benaloh, M. Chase and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records” ACM Cloud Computing Security Workshop, pp. 103–114, 2009.
    3. H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks” IEEE Transaction on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22–32, Jan 2014.
    4. M.Green and G.Ateniese, “Identity-based proxy re-encryption” Applied Cryptography and Network Security, vol. 4521, pp. 288–306, 2007.
    5. W. S. K. Liang and J. Liu, “Privacy-preserving ciphertext multi-sharing control for big data storage” IEEE Transaction on Information Forensics and Security, vol. 10, no. 8, Aug 2015.
    6. K. B. G. Ateniese and S. Hohenberger, “Key-private proxy re-encryption”Topics in Cryptology- CT- RSA (Lecture Notes in Computer Science), vol. 5473, pp. 279–294, 2009.
    7. S.H.R. Canetti and J.Katz, “Chosen-ciphertext security from identity-based encryption” Advances in Cryptology-EUROCRYPT, pp. 207–222, 2004.
    8. S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5g”, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
    9. T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networks”, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.
  • Downloads

  • How to Cite

    Singh, A., Shukla, S., & B, S. (2018). A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context. International Journal of Engineering and Technology, 7(2.8), 358-360. https://doi.org/10.14419/ijet.v7i2.8.10462