High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Identify Cloud Access Rights Revocation Authority by using Identify Based Encryption

Author(s):

B Ganesh , KMM INSTITUTE OF PG STUDIES, TIRUPATI; C Hemavathy, KMM INSTITUTE OF PG STUDIES, TIRUPATI

Keywords:

Encryption, Authentication, Cloud Computing, Outsourcing Computation, Revocation Authority

Abstract

Identity-based cryptography (IBE) could be a public key cryptosystem and eliminates the stress of public key infrastructure (PKI) and certificate administration in standard public key settings. Due to the absence of PKI, the revocation drawback could be a important issue in IBE settings. Several rescindable IBE schemes are projected concerning this issue. Quite recently, by embeded an outsourcing computation technique into IBE, Li et al. proposed a rescindable IBE theme with a key-update cloud service supplier (KU-CSP). However, their scheme has two shortcomings. One is that the computation and communication prices square measure beyond previous rescindable IBE schemes. The other defect is lack of quantifiability within the sense that the KU-CSP should keep a secret worth for every user. In this article, we proposed a new revocable IBE scheme with CRA to solve the two shortcomings, namely, the performance is significantly improved. For security analysis, we tend to demonstrate that the planned theme is semantically secure beneath the decisional linear Diffie-Hellman (DBDH) assumption. Finally, we tend to extend the projected rescindable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized variety of varied cloud services.

Other Details

Paper ID: IJSRDV7I20120
Published in: Volume : 7, Issue : 2
Publication Date: 01/05/2019
Page(s): 97-99

Article Preview

Download Article