SlideShare a Scribd company logo
IDENTITY BASED SECURE DISTRIBUTED
DATA STORAGE SCHEMES
BY:
N.SAHITHI.
LITERATURE SURVEY
 Atomic proxy crypto system where a semi-trusted proxy server can transfer a
cipher text of the original decryptor to a cipher text for the designated decryptor
without knowing plain text. It is used in e-mail forwarding.
 Identity based crypto system introduced by shamir. It is a system where the public
key can be arbitrary string and secret key is issued by trusted third party.
 Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .
 In these schemes, the master secret key which is used to extract secret keys for
users is split into 2 parts one is sent to proxy server other is sent to user.
 The user can decrypt cipher text with the help of proxy server, but
these schemes are not secure against collusion attacks.
 Identity- based proxy re-encryption proposed by green and ateniese.
Where proxy server can transfer a cipher text of original decryptor to
cipher text of designated decryptor after he gets a re-encryption key.
 This schemes are classified into 2 types based on generation of re-
encryption key
i) Re-encryption key generated/computed by original decryptor
ii) Re-encryption key generated/computed by private key generator.

More Related Content

DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Control cloud data access privilege and
PPTX
Virtualization
PDF
Ijcatr04051002
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PPTX
Distance-bounding facing both mafia and distance frauds
PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud data access privilege and
Virtualization
Ijcatr04051002
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Distance-bounding facing both mafia and distance frauds
Improving the Secure Socket Layer by Modifying the RSA Algorithm

What's hot (18)

PPTX
Wpa2 psk security measure
PDF
Location based authentication new words approch secuirity
DOC
Social Engg. Assignment it17 final (1)
PPT
Chapter 08
PDF
Iaetsd a survey on cloud storage security with
PDF
Web Security
PDF
Enhancement in network security with security
PDF
Enhancement in network security with security protocols
PDF
Implementation of public key cryptography in kerberos with prevention 2
DOCX
efficient authentication for mobile and pervasive computing
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
PDF
Skyriver Communications – Fixed Wireless Security
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
PDF
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
PDF
RSA 32-bit Implementation Technique
PDF
Computer security module 4
PPTX
Efficient authentication for mobile and pervasive computing
Wpa2 psk security measure
Location based authentication new words approch secuirity
Social Engg. Assignment it17 final (1)
Chapter 08
Iaetsd a survey on cloud storage security with
Web Security
Enhancement in network security with security
Enhancement in network security with security protocols
Implementation of public key cryptography in kerberos with prevention 2
efficient authentication for mobile and pervasive computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
Skyriver Communications – Fixed Wireless Security
A lightweight secure scheme for detecting provenance forgery and packet drop ...
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
RSA 32-bit Implementation Technique
Computer security module 4
Efficient authentication for mobile and pervasive computing
Ad

Similar to literature survey for identity based secure distributed data storage (20)

PPT
Identity based secure distributed data storage schemes
PPT
PPT FOR IDBSDDS SCHEMES
DOCX
Identity based secure distributed data storage
PDF
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
DOCX
Identity based secure distributed data storage schemes
PDF
P01813101103
PPTX
Identity Based Secure Distributed Storage Scheme
DOC
documentation for identity based secure distrbuted data storage schemes
DOC
Srs document for identity based secure distributed data storage schemes
PPTX
Secure sensitive data sharing on a big data platform
PPTX
Secure sensitive data sharing on a big data platform
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
PDF
B04010610
PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
DOCX
Identity based proxy-oriented data uploading and
PDF
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Identity based secure distributed data storage schemes
PPT FOR IDBSDDS SCHEMES
Identity based secure distributed data storage
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
Identity based secure distributed data storage schemes
P01813101103
Identity Based Secure Distributed Storage Scheme
documentation for identity based secure distrbuted data storage schemes
Srs document for identity based secure distributed data storage schemes
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
B04010610
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Identity based proxy-oriented data uploading and
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Ad

More from Sahithi Naraparaju (12)

PPT
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
PPT
over view of viruses
PPT
66913017 java-ring-1217949449014046-9 (1)
PPTX
Self protecteion in clustered distributed system new
PPT
OVERVIEW OF ‘C’ PROGRAM
PPT
CONSTANTS, VARIABLES & DATATYPES IN C
PPT
constants, variables and datatypes in C
PPT
Steps for Developing a 'C' program
PPT
pre processor directives in C
PPTX
Self protecteion in clustered distributed system new
PPTX
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
PPT
Haptic technology
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
over view of viruses
66913017 java-ring-1217949449014046-9 (1)
Self protecteion in clustered distributed system new
OVERVIEW OF ‘C’ PROGRAM
CONSTANTS, VARIABLES & DATATYPES IN C
constants, variables and datatypes in C
Steps for Developing a 'C' program
pre processor directives in C
Self protecteion in clustered distributed system new
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
Haptic technology

literature survey for identity based secure distributed data storage

  • 1. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES BY: N.SAHITHI.
  • 2. LITERATURE SURVEY  Atomic proxy crypto system where a semi-trusted proxy server can transfer a cipher text of the original decryptor to a cipher text for the designated decryptor without knowing plain text. It is used in e-mail forwarding.  Identity based crypto system introduced by shamir. It is a system where the public key can be arbitrary string and secret key is issued by trusted third party.  Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .  In these schemes, the master secret key which is used to extract secret keys for users is split into 2 parts one is sent to proxy server other is sent to user.
  • 3.  The user can decrypt cipher text with the help of proxy server, but these schemes are not secure against collusion attacks.  Identity- based proxy re-encryption proposed by green and ateniese. Where proxy server can transfer a cipher text of original decryptor to cipher text of designated decryptor after he gets a re-encryption key.  This schemes are classified into 2 types based on generation of re- encryption key i) Re-encryption key generated/computed by original decryptor ii) Re-encryption key generated/computed by private key generator.