Identity based Proxy Re-Encryption using Forward Security in Cloud Framework

Miss. Jaitee Bankar, Prof. Jyoti Raghatwan

Abstract


The public key and certificate management in Public Key Infrastructure (PKI) is simplified by an Identity based encryption (IBE) is an important substitute to public key encryption. The main drawback of IBE is the overhead computation in Private Key Generator (PKG) during user revocation. Proficient revocation has been well considered in traditional PKI setting, but the burdensome management of certificates is precisely the trouble that IBE strives to lighten. In this paper, aiming at tackling the important issue of identity revocation, we are introducing the outsourcing computation into IBE and suggest a revocable IBE scheme should be added in the server-aided setting. Our proposed scheme delivers most of the key generation related operations i.e. key-issuing and Key update processes are performed by Key Update Cloud Service Provider, leaving only a fixed number of simple operations for PKG and users to perform locally. By utilizing a novel collusion-resistant technique, this goal is achieved: we make use of a hybrid private key for each user, in which an AND gate is drawn in to attach and bound the identity component and the time component. In addition, we propose another technique which is verifiable secure under the recently formulized Refereed Delegation of Computation model. To end with, we provide extensive experimental results to reveal the effectiveness of our proposed construction.

Full Text:

PDF

References


Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, and Hai Jin,

”Conditional Identity-Based Broadcast Proxy Re-Encryption and Its

Application to Cloud Email”, IEEE Transactions on Computers, Vol. 65,

No. 1, 2016.

”Amazon.com,” Amazon Web Services (AWS), 2008. [Online]. Available:

http://aws.amazon.com

C. Erway, A. Kupc, C. Papamanthou, and R. Tamassia, ”Dynamic

provable data possession,” in Proceedings of the 16th ACM Conference

on Computer and Communications Security, 2009.

E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, ”Sirius: Securing

remote untrusted storage,” in Proceedings of the Network and Distributed

System Security Symposium, 2003.

F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and

J.-J. Quisquater, ”Efficient remote data possession checking in critical

information infrastructures,” in IEEE Trans. on Knowl. And Data Eng,

vol. 20, no. 8, 2008.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, ”Improved proxy

re-encryption schemes with applications to secure distributed storage,” in

Proceedings of the Network and Distributed System Security Symposium,

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ”Scalable

and efficient provable data possession,” in Proceedings of the 4th

International Conference on Security and Privacy in Communication

Networks, 2008.

Andreas Jakoby and Maciej Liskiewicz (2005), ”Revealing Additional

Information in Two-Party Computations” , Advances in Cryptology -

ASIACRYPT 2005 Lecture Notes in Computer Science Volume 3788,

-135.

Dr. Durgesh Kumar, Neha Koria, Nikhil Kapoor, Ravish Bahety, ”A

Secure Multi-Party Computation Protocol for Malicious Computation

Prevention for Preserving Privacy During Data Mining”, International

Journal of Computer Science and Information Security,Vol. 3., 2009.

Akheel Mohammed, Sajjad Ahmed Md , Ayesha, ”Confidentiality And

Anonymity Strengthening in Computational Services”, IJRRECS,Volume-

,Issue-6,1006-1011, 2013.

Swathi, P.Jyothi, and Anil Kumar, ”Assigning Privacy Ids For Each Data

That Have Been Sharing In Wireless Networks”, International Journal

of Communication Network and Security (IJCNS) ISSN: Volume-2,

Issue-3, 2014.

Ms. R. Kalaivani, Ms. R. Kiruthika, ”Automated Anonymous Id

Assignment For Maintaining Data Privacy”, International Conference on

Science,Engineering and Management, Srinivasan Engineering College,

India, 2014.

Javier Herranz IIIA, ”Identity-Based Ring Signatures from RSA”,

Artificial Intelligence Research Institute, Spanish National Research

Council, Campus UAB s/n, E-08193 Bellaterra, Spain, 2007.

M. Bellare and S. Miner, ”A forward-secure digital signature scheme,”

in Proc. 19th Annu. Int. Cryptol. Conf., vol. 1666, pp. 431448, 1999.

J.M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau,

”Security and privacy-enhancing multicloud architectures,” IEEE

Transractions on Dependable and Secure Computing, vol. 10, no. 4, pp.

, 2013.

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang,

Li Xu, Jianying Zhou,”Cost-Effective Authentic and Anonymous Data

Sharing with Forward Security”, IEEE Transactions on Computers, Vol.

, No. 6, 2015.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology