Volume- 3
Issue- 2
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
L.Kalaivani , Dr.R.Kalpana
In this project we intervened certificateless encryption plan without matching operations for safely imparting public cloud. Intervened certificateless open key encryption (mCL-PKE –Mediated certificateless public key encryption) takes care of the key escrow issue in identity based encryption and testament repudiation issue in public cloud key cryptography. In existing mCL-PKE plans are wasteful in utilization of costly blending operations or helpless against incomplete unscrambling assaults. With a specific end goal to address the execution and security issues, in this project, we first propose a mCL-PKE plan without utilizing matching operations. We apply our mCL-PKE plan to develop a down to earth answer for the issue of offering touchy data out in the open mists. The cloud is utilized as a protected stockpiling and a key era focus. In our framework, the information manager scrambles the delicate information utilizing the cloud produced clients' open keys focused around its get to control arrangements and transfers the scrambled information to the cloud. Upon effective approval, the cloud incompletely unscrambles the encoded information for the clients. The clients in this manner completely unscramble the halfway decoded information utilizing their private keys. The secrecy of the substance and the keys is safeguarded as for the cloud, in light of the fact that the cloud can't completely unscramble the data. We additionally propose an augmentation to the above methodology to enhance the effectiveness of encryption at the information manager. Finally we execute our mCL-PKE plan and the general cloud based framework with the help of proxy, in order to access data if users lost their certificate or key.
[1] V.Goyal,O. Pandey,A.Sahai,andB. Waters, “Attribute- based encryptionforfine-grainedaccesscontrol of encrypted data,” in CCS,ACM, 2006,pp.89–98.
[2] S.Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable,andfine-graineddata access controlincloud computing,” inINFOCOM, 2010,pp.534–5.
[3]R. Ostrovsky,A. Sahai, and B. Waters, “Attribute-based encryptionwithnon-monotonic accessstructures,”inACM Conference onComputer andCommunications Security, 2007, pp.195–203.
[4] BethencourtJ, SahaiA,WatersB.“Ciphertext-policyattribute basedencryption”.In:Proceedings ofISSP;2007,pp. 321-34. [5] BonehD,FranklinM.,”Identity-basedencryptionfrom theWeil pairing”. In: Proceedings of CRYPTO. LNCS, vol. 2139; 2001,pp.213-29
[6]Y.Zhu, H.Hu, G.-J.Ahn, D.Huang, and S.Wang, “Towards Temporal Access control inclouds,” in Proc.IEEE INFOCOM, 2012,pp.2576-2580.
[7] Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM,IEEE, 2010, pp. 534–542.
[8] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, “Comparisonbased encryption for fine-grained access control in clouds,” in CODASPY, ACM, 2012, pp. 23-55.
[9] A.Sahai and B. Waters, “Fuzzy identity-based encryption,” in EUROCRYPT, Springer, 2005, pp. 457–473.
[10] Zhiguo Wan, Jun’e Liu, Robert H. Deng,”HASBE: A Hierarchical Attribute - Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE Transactions on Information Forensincs and Security, Vol. 7, NO. 2, April 2012, pp. 67-90.
[11] Tim Mather, Subra Kumaraswamy, shahed Latif, “Cloud Security and privacy: An Enterprise respective of risk and compliance Theory in practice” , 2012, pp. 98- 105.
Department of Computer Science & Engineering, IFET College of Engineering.
No. of Downloads: 6 | No. of Views: 1233