• editor.aipublications@gmail.com
  • Track Your Paper
  • Contact Us
  • ISSN: 2456-7817

International Journal Of Engineering, Business And Management(IJEBM)

An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption

Pranav R. More , Sheetal Y. Gaikwad


International Journal of Engineering, Business And Management(IJEBM), Vol-1,Issue-1, May - June 2017, Pages 12-14 ,

Download | Downloads : 6 | Total View : 2015

Share

We have developed secure data sharing in cloud computing system using revocable storage identity based encryption. We have used AES (Advanced Encryption standard) technique to encrypt data as well as decrypt data. We have extracted different features like extra security, forward secrecy, confidentiality, and secure data sharing. In this paper, we used RS- IBE (Revocable Storage Identity- Based Encryption) and KUNode algorithm for the security as well as recognized all members in whole system. We have also used the re-encryption technique for advanced secure data sharing in cloud computing. Main approach is that time periods is provided for write OTP to download or access the data. And which is gives advanced secure sharing of data in cloud computing.

Cloud computing, Data Sharing, RS_IBE, AES, encryption key and decryption key.

[1] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2016.2545668, IEEETransactions on Cloud Computing.
[2] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003.
[3] International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 ISSN 2229-5518
[4] J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, “Forwardsecure identity-based signature: security notions and construction,” Information Sciences, vol. 181, no. 3, pp. 648–660, 2011.
[5] iCloud. (2014) Apple storage service. [Online]. Available:https://www.icloud.com/
[6] Revocable Identity-Based Encryption Revisited:Security Model and Construction ∗Jae Hong Seoyand Keita EmurayJanuary 10, 2013
[7] A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008. This is the full version.
[8] A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008. This is the full version.
[9] Identity-based Encryption with Efficient Revocation Alexandra Boldyreva∗School of Computer ScienceGeorgia Institute of Technology Atlanta, GAaboldyre@cc.gatech.edu