Downloads: 125 | Views: 294 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 7 Issue 5, May 2018 | Popularity: 7 / 10
A Survey on Security and Privacy in Cloud Computing
Priyanka V. Surnar, S. G. Swami
Abstract: Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographically primitive to build a practical data sharing system. However, access control is not static. That is, when some users authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of cipher text by introducing the functionalities of user revocation and cipher text update simultaneously. Furthermore, we present a concrete construction of RS-IBE, and prove its security in the defined security model. The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system. Finally, we provide implementation results of the proposed scheme to demonstrate its practicability.
Keywords: decryption key exposure, Cloud computing, data sharing, revocation, Identity-based encryption, cipher text update
Edition: Volume 7 Issue 5, May 2018
Pages: 653 - 657
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2704 - 2706Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
Minakshi B. Shingan, Sanchika A. Bajpai
Downloads: 116
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2618 - 2620A Unified Scheme of Hierarchical Attribute-Based Encryption
Syeda Husna Mehanoor, Syeda Ayesha Thainiath
Downloads: 117
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 165 - 173Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control
Shintomon Mathew, George T. Vadakkumcheril, T. Justin Jose
Downloads: 122
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1783 - 1785Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems
S. N. Shitole, A D Gujar
Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1642 - 1645Novel Framework of Identity Based Encryption with CRA
Latha M R, Dr.Shiva Murthy G, Ramakrishna Prasad A.L