International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 326

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.4 / 10


     

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil


Abstract: Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator (PKG). However, one of the main drawback of IBE is overheaded computation at PKG during user revocation. The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key-issuing and key-update process leaving only a number of simple operations for PKG and users to perform locally. For this, we generate a hybrid private key for each user, in which an AND gate is used to connect and bound the identity component and time component. But KU-CSP is untrusted. So, we propose a Pseudonym Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We generate pseudonym for each users to hide users original identity. along with this we increase the security by combining the techniques Identity Based Encryption and Attribute Based Encryption. also we use multiple KU-CSP for load balancing purpose. For integrity checking, we generate signature before uploading the data in cloud. Using this signature integrity of the file is verified.


Keywords: Identity Based Encryption, Attribute Based Encryption, Pseudonym


Edition: Volume 5 Issue 6, June 2016


Pages: 1314 - 1316



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kirti Patil, Sonali Patil, "Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 1314-1316, https://www.ijsr.net/getabstract.php?paperid=NOV164503

Similar Articles

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut, Seema Singh

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this Article
Top