A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    This survey paper categorizes, compares, andsummarizes the algorithms, data sets and performance measurement in the published articles related to proxy re-encryption and medical systems. Most of the systems either deploy a pre-authentication approach or a proxy re-encryption approach, they are seldom seen together. Most of the systems either take a patient -centric or a doctor-centric approach whereas the demand is for a common system that can be accessible to all access groups. Multi-data sharing is another concept that is necessary to be implemented in the newer systems and is lacking in many of them .The proposed system overcomes all these problems . It uses RSA for the pre authentication and AES algorithm to to perform pre authentication.

  • Keywords

    Pre-Authentication, Proxy Re-encryption, Identity-based encryption(IBE), Ciphertext.

  • References

      [1] K. R. M. Li, S. Yu and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings”, Security and Privacy in Communication Networks, International ICST Conference, SECURECOMM, pp. 89–106, 2010.

      [2] E. H. J. Benaloh, M. Chase and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records” ACM Cloud Computing Security Workshop, pp. 103–114, 2009.

      [3] H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks” IEEE Transaction on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22–32, Jan 2014.

      [4] M.Green and G.Ateniese, “Identity-based proxy re-encryption” Applied Cryptography and Network Security, vol. 4521, pp. 288–306, 2007.

      [5] W. S. K. Liang and J. Liu, “Privacy-preserving ciphertext multi-sharing control for big data storage” IEEE Transaction on Information Forensics and Security, vol. 10, no. 8, Aug 2015.

      [6] K. B. G. Ateniese and S. Hohenberger, “Key-private proxy re-encryption”Topics in Cryptology- CT- RSA (Lecture Notes in Computer Science), vol. 5473, pp. 279–294, 2009.

      [7] S.H.R. Canetti and J.Katz, “Chosen-ciphertext security from identity-based encryption” Advances in Cryptology-EUROCRYPT,pp. 207–222, 2004.

      [8] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5g”, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

      [9] T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networks”, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.




Article ID: 10462
DOI: 10.14419/ijet.v7i2.8.10462

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.