International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator (PKG). However, one of the main drawback of IBE is overheaded computation at PKG during user revocation. The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key-issuing and key-update process leaving only a number of simple operations for PKG and users to perform locally.For this, we generate a hybrid private key for each user, in which an AND gate is used to connect and bound the identity component and time component.But KU-CSP is untrusted. So, we propose a Pseudonym Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We generate pseudonym for each users to hide users original identity. along with this we increase the security by combining the techniques Identity Based Encryption and Attribute Based Encryption. also we use multiple KU-CSP for load balancing purpose. For integrity checking, we generate signature before uploading the data in cloud. Using this signature integrity of the file is verified.

Keywords: Identity Based Encryption, Attribute Based Encryption, Pseudonym

Edition: Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Share this Article

How to Cite this Article?

Kirti Patil, Sonali Patil, "Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164503, Volume 5 Issue 6, June 2016, 1314 - 1316

36 PDF Views | 33 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Identity Based Encryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2375 - 2378

A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage

Rachana Gangwani, H. A. Hingoliwala

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 585 - 587

A Survey on Encryption Methods for Providing Security in Pub/Sub System

Onkar P. Kasarlewar, P. S. Desai

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 230 - 235

Privacy-Preserved Search in mCL-PKE Based Secure Data Sharing over Public Clouds and Credential Trust Management through SMTP Communication

Shintomon Mathew, Asha Jose

Share this Article

Similar Articles with Keyword 'Attribute Based Encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2488 - 2491

Securing Mobile User Data in Cloud Computing Environment

Manoj M. Chavan, Poonam V. Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2375 - 2378

A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage

Rachana Gangwani, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'Pseudonym'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 815 - 819

Secure Vehicular Traffic Re-routing System using SCMS in Connected Cars

Prasad Mhatre, Manjushri Mahajan

Share this Article



Top