SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND
ITS APPLICATIONS
ABSTRACT:
Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands
of public key infrastructure (PKI) and certificate administration in conventional public key
settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings.
Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by
embedding an outsourcing computation technique into IBE, Li et al. proposed a revocable IBE
scheme with a key-update cloud service provider (KU-CSP). However, their scheme has two
shortcomings. One is that the computation and communication costs are higher than previous
revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU-
CSP must keep a secret value for each user. In the article, we propose a new revocable IBE
scheme with a cloud revocation authority (CRA) to solve the two shortcomings, namely, the
performance is significantly improved and the CRA holds only a system secret for all the users.
For security analysis, we demonstrate that the proposed scheme is semantically secure under the
decisional bilinear Diffie-Hellman (DBDH) assumption. Finally, we extend the proposed
revocable IBE scheme to present a CRA-aided authentication scheme with period-limited
privileges for managing a large number of various cloud services.
EXISTING SYSTEM:
 Li et al. introduced an outsourcing computation technique into IBE to propose a
revocable IBE scheme with a key-update cloud service provider (KU-CSP). They shifts
the key-update procedures to a KU-CSP to alleviate the load of PKG.
 Li et al. also used the similar technique adopted in Tseng and Tsai’s scheme, which
partitions a user’s private key into an identity key and a time update key.
 The PKG sends a user the corresponding identity key via a secure channel. Meanwhile,
the PKG must generate a random secret value (time key) for each user and send it to the
KU-CSP.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Then the KUCSP generates the current time update key of a user by using the associated
time key and sends it to the user via a public channel.
DISADVANTAGES OF EXISTING SYSTEM:
 ID-based encryption (IBE) allows a sender to encrypt message directly by using a
receiver’s ID without checking the validation of public key certificate.
 In existing system misbehaving/compromised users in an ID-PKS setting is naturally
raised.
 Immediate revocation method employs a designated semi-trusted and online authority
(i.e. mediator) to mitigate the management load of the PKG and assist users to decrypt
ciphertext.
 The computation and communication costs are higher than previous revocable IBE
schemes.
 The other shortcoming is un-scalability in the sense that the KU-CSP must keep a time
key for each user so that it will incur the management load.
PROPOSED SYSTEM:
 In order to solve both the un-scalability and the inefficiency in Li et al.’s scheme, we
propose a new revocable IBE scheme with cloud revocation authority (CRA).
 In particular, each user’s private key still consists of an identity key and a time update
key. We introduce a cloud revocation authority (CRA) to replace the role of the KU-CSP
in Li et al.’s scheme. The CRA only needs to hold a random secret value (master time
key) for all the users without affecting the security of revocable IBE scheme.
 The CRA uses the master time key to generate the current time update key periodically
for each non-revoked user and sends it to the user via a public channel. It is evident that
our scheme solves the un-scalability problem of the KU-CSP.
 We construct a CRA-aided authentication scheme with period-limited privileges for
managing a large number of various cloud services.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
ADVANTAGES OF PROPOSED SYSTEM:
 The proposed scheme possesses the advantages of both Tsengand Tsai’s revocable IBE
scheme and Li et al.’s scheme.
 The proposed present the framework of our revocable IBE scheme with CRA and define
its security notions to model possible threats and attacks
 CRA-aided authentication scheme with period-limited privileges for managing a large
number of various cloud services.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

More Related Content

PDF
Identity based encryption with outsourced revocation in cloud computing
PDF
Identity based encryption with cloud revocation authority and its applications
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
An Overview of Identity Based Encryption
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
PDF
iaetsd Robots in oil and gas refineries
PDF
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with outsourced revocation in cloud computing
An Overview of Identity Based Encryption
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
iaetsd Robots in oil and gas refineries
Identity-Based Encryption with Outsourced Revocation in Cloud Computing

What's hot (19)

DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
DOC
documentation for identity based secure distrbuted data storage schemes
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
DOC
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
sweeney_brendan-css527-20141118-research_proposal
PDF
Identity based cryptography for client side security in web applications (web...
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
6.designing secure and efficient biometric based secure access mechanism for ...
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PPTX
Decentralization of internet of things with blockchain architecture
 
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
PDF
Distributed private key generator in ibc
PPT
PPT FOR IDBSDDS SCHEMES
PDF
Cued click point image based kerberos authentication protocol
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Identity based proxy-oriented data uploading and remote data integrity checki...
documentation for identity based secure distrbuted data storage schemes
Identity based proxy-oriented data uploading and remote data integrity checki...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Identity based encryption with outsourced revocation in cloud computing
sweeney_brendan-css527-20141118-research_proposal
Identity based cryptography for client side security in web applications (web...
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Control cloud data access privilege and anonymity with fully anonymous attrib...
6.designing secure and efficient biometric based secure access mechanism for ...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Decentralization of internet of things with blockchain architecture
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Distributed private key generator in ibc
PPT FOR IDBSDDS SCHEMES
Cued click point image based kerberos authentication protocol
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute Based Encryption with Privacy Preserving In Clouds
Ad

Similar to Identity based encryption with cloud revocation authority and its applications (20)

DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
DOC
An efficient certificate less encryption for
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
DOCX
Identity based encryption with outsourced
PDF
Secure outsourced attribute based signatures
PDF
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
PDF
Decentralized access control with anonymous authentication of data stored in ...
PDF
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
PDF
Security Analysis of Mobile Authentication Using QR-Codes
PDF
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
PDF
Fine grained two-factor access control for web-based cloud computing services
PDF
Fine grained two-factor access control for web-based cloud computing services
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with outsourced revocation in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
An efficient certificate less encryption for
Identity based encryption with outsourced revocation in cloud computing
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Key aggregate cryptosystem for scalable data sharing in cloud storage
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity based encryption with outsourced
Secure outsourced attribute based signatures
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Decentralized access control with anonymous authentication of data stored in ...
SECURITY ANALYSIS OF MOBILE AUTHENTICATION USING QR-CODES
Security Analysis of Mobile Authentication Using QR-Codes
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Fine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing services
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Complications of Minimal Access Surgery at WLH
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Institutional Correction lecture only . . .
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cell Structure & Organelles in detailed.
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
RMMM.pdf make it easy to upload and study
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Pharma ospi slides which help in ospi learning
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Institutional Correction lecture only . . .
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cell Structure & Organelles in detailed.
TR - Agricultural Crops Production NC III.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pre independence Education in Inndia.pdf
RMMM.pdf make it easy to upload and study

Identity based encryption with cloud revocation authority and its applications

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS ABSTRACT: Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, Li et al. proposed a revocable IBE scheme with a key-update cloud service provider (KU-CSP). However, their scheme has two shortcomings. One is that the computation and communication costs are higher than previous revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU- CSP must keep a secret value for each user. In the article, we propose a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. Finally, we extend the proposed revocable IBE scheme to present a CRA-aided authentication scheme with period-limited privileges for managing a large number of various cloud services. EXISTING SYSTEM:  Li et al. introduced an outsourcing computation technique into IBE to propose a revocable IBE scheme with a key-update cloud service provider (KU-CSP). They shifts the key-update procedures to a KU-CSP to alleviate the load of PKG.  Li et al. also used the similar technique adopted in Tseng and Tsai’s scheme, which partitions a user’s private key into an identity key and a time update key.  The PKG sends a user the corresponding identity key via a secure channel. Meanwhile, the PKG must generate a random secret value (time key) for each user and send it to the KU-CSP.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Then the KUCSP generates the current time update key of a user by using the associated time key and sends it to the user via a public channel. DISADVANTAGES OF EXISTING SYSTEM:  ID-based encryption (IBE) allows a sender to encrypt message directly by using a receiver’s ID without checking the validation of public key certificate.  In existing system misbehaving/compromised users in an ID-PKS setting is naturally raised.  Immediate revocation method employs a designated semi-trusted and online authority (i.e. mediator) to mitigate the management load of the PKG and assist users to decrypt ciphertext.  The computation and communication costs are higher than previous revocable IBE schemes.  The other shortcoming is un-scalability in the sense that the KU-CSP must keep a time key for each user so that it will incur the management load. PROPOSED SYSTEM:  In order to solve both the un-scalability and the inefficiency in Li et al.’s scheme, we propose a new revocable IBE scheme with cloud revocation authority (CRA).  In particular, each user’s private key still consists of an identity key and a time update key. We introduce a cloud revocation authority (CRA) to replace the role of the KU-CSP in Li et al.’s scheme. The CRA only needs to hold a random secret value (master time key) for all the users without affecting the security of revocable IBE scheme.  The CRA uses the master time key to generate the current time update key periodically for each non-revoked user and sends it to the user via a public channel. It is evident that our scheme solves the un-scalability problem of the KU-CSP.  We construct a CRA-aided authentication scheme with period-limited privileges for managing a large number of various cloud services.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com ADVANTAGES OF PROPOSED SYSTEM:  The proposed scheme possesses the advantages of both Tsengand Tsai’s revocable IBE scheme and Li et al.’s scheme.  The proposed present the framework of our revocable IBE scheme with CRA and define its security notions to model possible threats and attacks  CRA-aided authentication scheme with period-limited privileges for managing a large number of various cloud services. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.2.1  Database : MYSQL