Secure Datasharing Using RS-IBE

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud registering gives the greater part clear technique for information sharing, it gives different reductions of the clients. Be that straightforwardly outsourcing the imparted information to the cloud server will achieve security issues Likewise the majority of the data might hold numerous profitable noteworthy information.It is essential to put cryptographically raised get control on the imparted information, named character based encryption(IBE) should Fabricate An useful information imparting skeleton. At some user's commission will be expired, there must a chance to be an strategy that could erase him/her starting with those frameworks naturally. Consequently, those evacuated clients can't get both the past What's more ensuing imparted majority of the data. Thus, we present An idea called revocable-storage(RS)-IBE, which presenting those functionalities from claiming client disavowal Also CIO content redesign all the while. And Moreover, we need aid including security on login framework about admin Furthermore client by 2-step confirmation and also uploaded in cloud by AWS.

     

     


  • Keywords


    Revocation, Encryption, Key Exchange, Private key generator, 2-step verification.

  • References


      [1] Alexandra Boldyreva (Georgia Institute of Technology, Atlanta GA, USA), Vipul Goyal (the University of California at Los Ange-les, CA, USA) and Virendra Kumar (Georgia Institute of Technology, Atlanta, GA, USA) Identity-based encryption with efficient revocation” 2008.

      [2] Chul Sur Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea, Youngho Park (Dept. of IT Con-vergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea), Sang UK Shin (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) Kyung Hyun Rhee (Dept. of IT Convergence &Applic. Eng., Pukyong Nat. Univ., Busan, South Korea) “Certificate-Based Proxy Re-encryption for Public Cloud Storage 2013”.

      [3] Mohan, Prakash, and Ravichandran Thangavel. Resource Se-lection in Grid Environment Based on Trust Evaluation using Feed-back and Performance. American Journal of Applied Sciences 10.8 (2013): 924.

      [4] Prakash, M., and T. Ravichandran. An Efficient Resource Selection and Binding Model for Job Scheduling in Grid. Europe-an Journal of Scientific Research 81.4 (2012): 450-458.

      [5] Jin Li (School of Computer Science, Guangzhou University, Guangzhou, China), Wenjing Lou (Virginia Polytechnic Institute and State University, Blacksburg) Identity-based encryption with outsourced revocation in cloud computing” 2015.

      [6] Prakash, M., R. Farah Sayeed, S. Prince, and S. Priyanka. De-ployment of MultiCloud Environment with Avoidance of DDOS Attack and Secured Data Privacy. International Journal of Applied Engineering Research 10, no. 9 (2015): 8121-8124.

      [7] Annamalai, R., J. Srikanth, and M. Prakash. Integrity and Pri-vacy Sustenance of Shared Large-Scale Images in the Cloud by Ring Signature. International Journal of Computer Applications 114.12 (2015).

      [8] Mohan Prakash, Chelliah Saravanakumar. “An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password”, International Journal of Information Security and Privacy, 11(2), 1-10, 2017.

      [9] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,2013.


 

View

Download

Article ID: 16275
 
DOI: 10.14419/ijet.v7i2.32.16275




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.