International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 127

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015


Survey: Identity- Based Encryption in Cloud Computing

Madhavi Langute | H. A. Hingoliwala [11]


Abstract: Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the overhead computation at private key generator (PKG). In this paper, going for survey on distinct method for handling the basic issue of Identity renouncement. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model.


Keywords: Identity-based encryption IBE, revocation, outsourcing, cloud computing


Edition: Volume 4 Issue 12, December 2015,


Pages: 862 - 866


How to Cite this Article?

Madhavi Langute, H. A. Hingoliwala, "Survey: Identity- Based Encryption in Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 862-866, https://www.ijsr.net/get_abstract.php?paper_id=NOV152091

How to Share this Article?






Similar Articles with Keyword 'revocation'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke | Vidya Dhamdhere [6]

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale [2] | Vilas Gaikwad [2]

Share this Article


Top