Identify Cloud Access Rights Revocation Authority by using Identify Based Encryption |
Author(s): |
| B Ganesh , KMM INSTITUTE OF PG STUDIES, TIRUPATI; C Hemavathy, KMM INSTITUTE OF PG STUDIES, TIRUPATI |
Keywords: |
| Encryption, Authentication, Cloud Computing, Outsourcing Computation, Revocation Authority |
Abstract |
|
Identity-based cryptography (IBE) could be a public key cryptosystem and eliminates the stress of public key infrastructure (PKI) and certificate administration in standard public key settings. Due to the absence of PKI, the revocation drawback could be a important issue in IBE settings. Several rescindable IBE schemes are projected concerning this issue. Quite recently, by embeded an outsourcing computation technique into IBE, Li et al. proposed a rescindable IBE theme with a key-update cloud service supplier (KU-CSP). However, their scheme has two shortcomings. One is that the computation and communication prices square measure beyond previous rescindable IBE schemes. The other defect is lack of quantifiability within the sense that the KU-CSP should keep a secret worth for every user. In this article, we proposed a new revocable IBE scheme with CRA to solve the two shortcomings, namely, the performance is significantly improved. For security analysis, we tend to demonstrate that the planned theme is semantically secure beneath the decisional linear Diffie-Hellman (DBDH) assumption. Finally, we tend to extend the projected rescindable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized variety of varied cloud services. |
Other Details |
|
Paper ID: IJSRDV7I20120 Published in: Volume : 7, Issue : 2 Publication Date: 01/05/2019 Page(s): 97-99 |
Article Preview |
|
|
|
|
