SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-
STORAGE IDENTITY-BASED ENCRYPTION
ABSTRACT:
Cloud computing provides a flexible and convenient way for data sharing, which brings
various benefits for both the society and individuals. But there exists a natural resistance for
users to directly outsource the shared data to the cloud server since the data often contain
valuable information. Thus, it is necessary to place cryptographically enhanced access control on
the shared data. Identity-based encryption is a promising cryptographical primitive to build a
practical data sharing system. However, access control is not static. That is, when some user’s
authorization is expired, there should be a mechanism that can remove him/her from the system.
Consequently, the revoked user cannot access both the previously and subsequently shared data.
To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE),
which can provide the forward/backward security of ciphertext by introducing the functionalities
of user revocation and ciphertext update simultaneously. Furthermore, we present a concrete
construction of RS-IBE, and prove its security in the defined security model. The performance
comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality
and efficiency, and thus is feasible for a practical and cost-effective data-sharing system. Finally,
we provide implementation results of the proposed scheme to demonstrate its practicability.
EXISTING SYSTEM:
 Boneh and Franklin first proposed a natural revocation way for IBE. They appended the
current time period to the ciphertext, and non-revoked users periodically received private
keys for each time period from the key authority.
 Boldyreva, Goyal and Kumar introduced a novel approach to achieve efficient
revocation. They used a binary tree to manage identity such that their RIBE scheme
reduces the complexity of key revocation to logarithmic (instead of linear) in the
maximum number of system users.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Subsequently, by using the aforementioned revocation technique, Libert and Vergnaud
proposed an adaptively secure RIBE scheme based on a variant of Water’s IBE scheme.
 Chen et al. constructed a RIBE scheme from lattices.
DISADVANTAGES OF EXISTING SYSTEM:
 Unfortunately, existing solution is not scalable, since it requires the key authority to
perform linear work in the number of non-revoked users. In addition, a secure channel is
essential for the key authority and non-revoked users to transmit new keys.
 However, existing scheme only achieves selective security.
 This kind of revocation method cannot resist the collusion of revoked users and malicious
non-revoked users as malicious non-revoked users can share the update key with those
revoked users.
 Furthermore, to update the ciphertext, the key authority in their scheme needs to maintain
a table for each user to produce the re-encryption key for each time period, which
significantly increases the key authority’s workload.
PROPOSED SYSTEM:
 It seems that the concept of revocable identity-based encryption (RIBE) might be a
promising approach that fulfills the aforementioned security requirements for data
sharing.
 RIBE features a mechanism that enables a sender to append the current time period to the
ciphertext such that the receiver can decrypt the ciphertext only under the condition that
he/she is not revoked at that time period.
 A RIBE-based data sharing system works as follows:
Step 1: The data provider (e.g., David) first decides the users (e.g., Alice and Bob) who can share
the data. Then, David encrypts the data under the identities Alice and Bob, and uploads
the ciphertext of the shared data to the cloud server.
Step 2: When either Alice or Bob wants to get the shared data, she or he can download and
decrypt the corresponding ciphertext. However, for an unauthorized user and the cloud
server, the plaintext of the shared data is not available.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Step 3: In some cases, e.g., Alice’s authorization gets expired, David can download the
ciphertext of the shared data, and then decrypt-then-re-encrypt the shared data such that
Alice is prevented from accessing the plaintext of the shared data, and then upload the
re-encrypted data to the cloud server again.
ADVANTAGES OF PROPOSED SYSTEM:
 We provide formal definitions for RS-IBE and its corresponding security model;
 We present a concrete construction of RS-IBE.
 The proposed scheme can provide confidentiality and backward/forward2 secrecy
simultaneously
 We prove the security of the proposed scheme in the standard model, under the decisional
ℓ-Bilinear Diffie-Hellman Exponent (ℓ-BDHE) assumption. In addition, the proposed
scheme can withstand decryption key exposure
 The procedure of ciphertext update only needs public information. Note that no previous
identity-based encryption schemes in the literature can provide this feature;
 The additional computation and storage complexity, which are brought in by the forward
secrecy, is all upper bounded by O(log(T )2), where T is the total number of time periods.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1GB.
SOFTWARE REQUIREMENTS:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

More Related Content

PPT
Secure Data Sharing in Cloud (SDSC)
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
PPT
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
PPTX
Oruta ppt
PDF
SecRBAC: Secure data in the Clouds
PDF
Oruta project report
Secure Data Sharing in Cloud (SDSC)
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Oruta ppt
SecRBAC: Secure data in the Clouds
Oruta project report

What's hot (20)

DOCX
Privacy preserving delegated access control in public clouds
PDF
Privacy preserving delegated access control in public cloud
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPTX
Data storage security in cloud computing
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PDF
Privacy Preserving Delegated Access Control in Public Clouds
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
DOCX
Privacy preserving delegated access control in public clouds
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPSX
Final year presentation
PPTX
data storage security technique for cloud computing
DOC
Oruta privacy preserving public auditing
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
J018145862
PDF
C04932125
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloud
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Data storage security in cloud computing
Ensuring data security in cloud computing. - Anusha Tuke
Privacy Preserving Delegated Access Control in Public Clouds
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Privacy preserving delegated access control in public clouds
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Final year presentation
data storage security technique for cloud computing
Oruta privacy preserving public auditing
Privacy preserving public auditing for regenerating-code-based cloud storage
Secure data sharing for dynamic groups in multi-owner using cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
J018145862
C04932125
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Ad

Viewers also liked (16)

PDF
Project titles abstract
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
A Workflow-Driven Discovery and Training Ecosystem for Distributed Analysis o...
DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PPTX
Analysis of-security-algorithms-in-cloud-computing [autosaved]
PPTX
Privacy preserving public auditing
DOCX
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
PDF
IEEE 2015-16 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH (CSE, IT) MCA, MSC-CS...
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PDF
Identity based encryption with outsourced revocation in cloud computing
DOC
Cloud Computing Documentation Report
DOCX
Report on cloud computing by prashant gupta
PPTX
Introduction of Cloud computing
PPTX
cloud computing ppt
Project titles abstract
Secure data sharing in cloud computing using revocable storage identity-based...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
Mona secure multi owner data sharing for dynamic groups in the cloud
A Workflow-Driven Discovery and Training Ecosystem for Distributed Analysis o...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Privacy preserving public auditing
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
IEEE 2015-16 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH (CSE, IT) MCA, MSC-CS...
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Identity based encryption with outsourced revocation in cloud computing
Cloud Computing Documentation Report
Report on cloud computing by prashant gupta
Introduction of Cloud computing
cloud computing ppt
Ad

Similar to Secure data sharing in cloud computing using revocable storage identity-based encryption (20)

PDF
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
DOCX
Comments on secure data sharing in cloud computing using revocable storage id...
DOCX
Identity based encryption with outsourced revocation in cloud computing
DOCX
Identity based encryption with outsourced revocation in cloud computing
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
DOCX
Identity based encryption with outsourced
DOCX
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
PDF
iaetsd Robots in oil and gas refineries
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Comments on secure data sharing in cloud computing using revocable storage id...
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with outsourced
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
iaetsd Robots in oil and gas refineries
A secure anti collusion data sharing scheme for dynamic groups in the cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Business Ethics Teaching Materials for college
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Business Ethics Teaching Materials for college
Insiders guide to clinical Medicine.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial disease of the cardiovascular and lymphatic systems
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study

Secure data sharing in cloud computing using revocable storage identity-based encryption

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE- STORAGE IDENTITY-BASED ENCRYPTION ABSTRACT: Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising cryptographical primitive to build a practical data sharing system. However, access control is not static. That is, when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of ciphertext by introducing the functionalities of user revocation and ciphertext update simultaneously. Furthermore, we present a concrete construction of RS-IBE, and prove its security in the defined security model. The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system. Finally, we provide implementation results of the proposed scheme to demonstrate its practicability. EXISTING SYSTEM:  Boneh and Franklin first proposed a natural revocation way for IBE. They appended the current time period to the ciphertext, and non-revoked users periodically received private keys for each time period from the key authority.  Boldyreva, Goyal and Kumar introduced a novel approach to achieve efficient revocation. They used a binary tree to manage identity such that their RIBE scheme reduces the complexity of key revocation to logarithmic (instead of linear) in the maximum number of system users.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Subsequently, by using the aforementioned revocation technique, Libert and Vergnaud proposed an adaptively secure RIBE scheme based on a variant of Water’s IBE scheme.  Chen et al. constructed a RIBE scheme from lattices. DISADVANTAGES OF EXISTING SYSTEM:  Unfortunately, existing solution is not scalable, since it requires the key authority to perform linear work in the number of non-revoked users. In addition, a secure channel is essential for the key authority and non-revoked users to transmit new keys.  However, existing scheme only achieves selective security.  This kind of revocation method cannot resist the collusion of revoked users and malicious non-revoked users as malicious non-revoked users can share the update key with those revoked users.  Furthermore, to update the ciphertext, the key authority in their scheme needs to maintain a table for each user to produce the re-encryption key for each time period, which significantly increases the key authority’s workload. PROPOSED SYSTEM:  It seems that the concept of revocable identity-based encryption (RIBE) might be a promising approach that fulfills the aforementioned security requirements for data sharing.  RIBE features a mechanism that enables a sender to append the current time period to the ciphertext such that the receiver can decrypt the ciphertext only under the condition that he/she is not revoked at that time period.  A RIBE-based data sharing system works as follows: Step 1: The data provider (e.g., David) first decides the users (e.g., Alice and Bob) who can share the data. Then, David encrypts the data under the identities Alice and Bob, and uploads the ciphertext of the shared data to the cloud server. Step 2: When either Alice or Bob wants to get the shared data, she or he can download and decrypt the corresponding ciphertext. However, for an unauthorized user and the cloud server, the plaintext of the shared data is not available.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Step 3: In some cases, e.g., Alice’s authorization gets expired, David can download the ciphertext of the shared data, and then decrypt-then-re-encrypt the shared data such that Alice is prevented from accessing the plaintext of the shared data, and then upload the re-encrypted data to the cloud server again. ADVANTAGES OF PROPOSED SYSTEM:  We provide formal definitions for RS-IBE and its corresponding security model;  We present a concrete construction of RS-IBE.  The proposed scheme can provide confidentiality and backward/forward2 secrecy simultaneously  We prove the security of the proposed scheme in the standard model, under the decisional ℓ-Bilinear Diffie-Hellman Exponent (ℓ-BDHE) assumption. In addition, the proposed scheme can withstand decryption key exposure  The procedure of ciphertext update only needs public information. Note that no previous identity-based encryption schemes in the literature can provide this feature;  The additional computation and storage complexity, which are brought in by the forward secrecy, is all upper bounded by O(log(T )2), where T is the total number of time periods. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1GB. SOFTWARE REQUIREMENTS:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.2.1  Database : MYSQL