Identity based Proxy Re-Encryption using Forward Security in Cloud Framework
Abstract
Full Text:
PDFReferences
Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, and Hai Jin,
”Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email”, IEEE Transactions on Computers, Vol. 65,
No. 1, 2016.
”Amazon.com,” Amazon Web Services (AWS), 2008. [Online]. Available:
http://aws.amazon.com
C. Erway, A. Kupc, C. Papamanthou, and R. Tamassia, ”Dynamic
provable data possession,” in Proceedings of the 16th ACM Conference
on Computer and Communications Security, 2009.
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh, ”Sirius: Securing
remote untrusted storage,” in Proceedings of the Network and Distributed
System Security Symposium, 2003.
F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and
J.-J. Quisquater, ”Efficient remote data possession checking in critical
information infrastructures,” in IEEE Trans. on Knowl. And Data Eng,
vol. 20, no. 8, 2008.
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, ”Improved proxy
re-encryption schemes with applications to secure distributed storage,” in
Proceedings of the Network and Distributed System Security Symposium,
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ”Scalable
and efficient provable data possession,” in Proceedings of the 4th
International Conference on Security and Privacy in Communication
Networks, 2008.
Andreas Jakoby and Maciej Liskiewicz (2005), ”Revealing Additional
Information in Two-Party Computations” , Advances in Cryptology -
ASIACRYPT 2005 Lecture Notes in Computer Science Volume 3788,
-135.
Dr. Durgesh Kumar, Neha Koria, Nikhil Kapoor, Ravish Bahety, ”A
Secure Multi-Party Computation Protocol for Malicious Computation
Prevention for Preserving Privacy During Data Mining”, International
Journal of Computer Science and Information Security,Vol. 3., 2009.
Akheel Mohammed, Sajjad Ahmed Md , Ayesha, ”Confidentiality And
Anonymity Strengthening in Computational Services”, IJRRECS,Volume-
,Issue-6,1006-1011, 2013.
Swathi, P.Jyothi, and Anil Kumar, ”Assigning Privacy Ids For Each Data
That Have Been Sharing In Wireless Networks”, International Journal
of Communication Network and Security (IJCNS) ISSN: Volume-2,
Issue-3, 2014.
Ms. R. Kalaivani, Ms. R. Kiruthika, ”Automated Anonymous Id
Assignment For Maintaining Data Privacy”, International Conference on
Science,Engineering and Management, Srinivasan Engineering College,
India, 2014.
Javier Herranz IIIA, ”Identity-Based Ring Signatures from RSA”,
Artificial Intelligence Research Institute, Spanish National Research
Council, Campus UAB s/n, E-08193 Bellaterra, Spain, 2007.
M. Bellare and S. Miner, ”A forward-secure digital signature scheme,”
in Proc. 19th Annu. Int. Cryptol. Conf., vol. 1666, pp. 431448, 1999.
J.M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau,
”Security and privacy-enhancing multicloud architectures,” IEEE
Transractions on Dependable and Secure Computing, vol. 10, no. 4, pp.
, 2013.
Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang,
Li Xu, Jianying Zhou,”Cost-Effective Authentic and Anonymous Data
Sharing with Forward Security”, IEEE Transactions on Computers, Vol.
, No. 6, 2015.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology