SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1141
Efficient and Enhanced Proxy Re-Encryption
Algorithm for Skyline Queries
K. Kalaivani
M.E, Department of CSE, SNS College of Engineering, Coimbatore, Tamil Nadu, India
ABSTRACT
Identity-based encryption (IBE) is a very attractive cryptographic primitive
due to its unnecessity of any certificate managements. Nevertheless, the user
revocation problem in IBE remains an elusive research problem and hence, it
is an important research topic.Onepossibleapproachinachieving revocations
is to update user’s decryption keys. However, to avoid the need of secret
channels, public time keys need to be issued to allow this update to occur. It is
unfortunate that this method often suffers from two problems:1)theuserhas
to maintain linearly growing decryption keys; and 2) the revoked users can
still access ciphertexts prior to revocation. At the first glance, proxy re-
encryption technique may provide a solution to this problem, but the
ciphertexts will become longer after each re-encryption, which makes it
impractical. In this paper, we present a revocable identity-based encryption
scheme with cloud-aidedciphertext evolution.Ourconstructionsolvesthetwo
aforementioned problems via ciphertext evolution implementedbythecloud.
Additionally, the size of ciphertexts in the cloud remains constant size
regardless of evolutions. The scheme is provably secure against chosen-
ciphertext attacks based on the BDH problem. The comparisons with the
existing related works show that our scheme enjoys better efficiency, thus is
practical for the data sharing in cloud storage.
How to cite this paper: K. Kalaivani
"Efficient and Enhanced Proxy Re-
Encryption AlgorithmforSkylineQueries"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-2, February
2020, pp.1141-1144, URL:
www.ijtsrd.com/papers/ijtsrd30294.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INRODUCTION
PUBLIC key encryption (PKE) provides an excellentsolution
to the problem of key distribution in symmetric key. An
important issue in PKE is the authenticity of user public
keys. The traditional PKE authenticates user public key via
releasing certificates. Nevertheless, the certificate
management is a heavy burden to the public key system,
which is the primary drawback in PKE. To overcome this
drawback, Shamir set forth a new notion called "Identity
based public key cryptography" in 1984. This public key
cryptosystem employs every user’s unique identity as its
public key. Therefore, the authenticityofthispublickeyis no
longer questionable, and hence, there is no certificate
required. Since the first practical identity-based encryption
(IBE) scheme was presented by Boneh and Franklin in 2001
[3], IBE has attracted a lot of attentions from both academia
and industry.
To date, there have been many IBE schemes proposed in the
literature. One important issue to make identity-based
encryption practical is the user revocation. This problem
was first discussed in BF’s seminal work. As stated earlier,
different from the traditional public key system, there is no
certificate in identity-based system. Therefore, the
conventional user revocation technique is not applicable to
the identity-based systems. Actually,theuserprivatekey can
be viewed as an implicit certificate. Boneh and Franklin
suggested that the PKG periodically issues new private keys
by attaching time tags for non-revoked users. The user
revocation can be launched by the PKG stopingtheissuing of
new user private keys with the time tags. Unfortunately,this
revocation system is very impractical, because the PKG has
to carry heavy overhead (O(n) where nisthenumberofnon-
revoked users), especially for the establishing of secret
channels. Boldyreva et al. presented the first scalable
revocable IBE scheme in 2008 their scheme, only public
channels are required for the key updating. Furthermore,
they utilized the complete subtree to realize a logarithm
growth O(log(n)) of key-updating with non-revoked users.
With this approach of revocation method, many revocable
identity-based encryption (RIBE) schemes have been
proposed. However, when taking these schemes in some
application scenarios, some problems arise. Let’s consider
the scenario of secure data sharing in cloud storage by
applying a revocable identity-based encryption. Suppose
there are four entities involved, namely the data owner, the
data user, the cloud server and the PKG. To our best
knowledge, the existing schemes suffer from two
shortcomings or at least one of them.
The data user needs to utilize the time key TKID as well as
the private key to decrypt a ciphertext encrypted at the time
t. So, the data user has to maintain all thetimekeys(O(t))(or
decryption keys computed from time keys) for different
time-period decryptions. This consumes a lot of storage
resources for data users, thus itisveryimpractical especially
in source-limited environments.
IJTSRD30294
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1142
When a user is revoked by the PKG for such as private key
compromise or expiring, the user can still decrypt those
ciphertexts prior to revocation in the cloud.
Though some works do not have these problems, theysuffer
from new problems: the ciphertexts grow longer with the
number of ciphertext-transformation (the basic
construction), or the costlycomputationandcommunication
of reencryption keys between the user and the server. We
give a new and efficient RIBE scheme that can solve the two
problems. As shown in Fig. 1, the cloud server helps a
ciphertext C uploaded by the data ownerevolvetoa newone
C0; then the data user decrypts the ciphertext by employing
merely its current time key as well as private key. So, the
data user only needs to keep one time key – the current time
key; and the revoked data user cannot access any ciphertext
including those before revocation; no matter how many
times a ciphertext in the cloud evolves, the length of the
ciphertext remains unchanged; different to proxy re-
encryption, no computation or communication isneeded for
the re-encryption keys.
Figure1: overall architecture
RELATED WORKS:
Boldyreva et al. first presented a scalable revocable IBE
scheme in 2008. The complete subtree structure is used to
obtain a logarithm growth of updating key. This work was
subsequently improved in with strong security. In 2013,Seo
and Emura introduced decryption-key-exposure threat and
presented a revocableIBEschemethatcanresistdecryption-
key-exposure. Sun et al. extended Seo et al.’s scheme to the
certificate less setting. In 2017, Watanabe et al. gave a new
revocable and decryption key-exposure resistent IBE
scheme. The scheme has short public parameters in prime-
order groups. A very recent work showed a revocable
hierarchical identity-based encryption scheme.
Unfortunately, almost all these RIBE works suffer from the
two drawbacks mentioned above especially in the
applications like cloud storage. In 2014, Liang et al.
employed proxy re-encryption technique to construct a
revocable identity-based encryption scheme. Their scheme
solves the two problems by re-encrypting ciphertexts in the
cloud. However, the ciphertexts become longer and longer
with the number of re-encryption. improved Liang et al.’s
scheme on the efficiency but suffers from increasing list of
decryption keys fordifferent-periodciphertexts.andpointed
out the security weakness of Liang et al.’s scheme against
collusion attacks. Other related works are such as In these
works, the revocation is implemented by a third party e.g.
the cloud server. Identity-based public key cryptography
(ID-PKC) was introduced by Shamir in 1984. It is a good
alternative for traditional PKC which requires high
maintenance cost for certificate management. However, ID-
PKC is easy to suffer from the private key escrow. To avoid
this drawback, Al-Riyami and Paterson introduced the
certi cateless publickeycryptography(CLPKC)in2003. The
CLPKC combines the advantages of ID-PKC and traditional
PKC because it has no key escrow and at the same time
alleviates the certi cate management. At present, a large
number of encryption and signature schemes are proposed
in CLPKC. We refer readers to works. In a public key
cryptosystem, an vital issue is howto revoke a user when
his/her private key is leaked or the permission is expired. In
traditional PKC, there exist some ripe revocation methods,
such as Certi cate Revocation List (CRL), online certi cate
status protocol (OCSP) and a revocationtechniqueproposed
by Novomodo. In ID-PKC and CLPKC, the initial revocation
technique is that the KGC periodically updates the (partial)
private key for the user. However, each new key must be
transmitted to the user through a secret channel. And the
establishment of secret channel requires a lotofcalculations
by the system and the users, which greatly increases the
communication overhead.Therefore,itisbettertousepublic
channels instead of secret channels when designing a
revocation scheme. As matters stand, many revocation
schemes with public channels have been proposed in ID-
PKC. In 2008, Boldyreva et al. presented an ID-based
encryption scheme with ef cient revocationn. In 2012,
Tseng and Tsai and Tsai et al. constructed a revocable ID-
based encryption scheme and a revocable ID-based
signature scheme with batch verica-tions. In 2013, Seo and
Emura proposed a revocable ID-based encryption scheme
against decryption exposure
Existing system
In contrast to traditional solutions, where theITservicesare
under proper physical, logical and personnel controls,Cloud
Computing moves the application softwareanddatabasesto
the large data centers, where the management of the data
and services may not be fully trustworthy. This unique
attribute, however, poses many new security challenges
which have not been well understood
PROPOSED SYSTEM
We focus on cloud data storage security, which has always
been an important aspect of quality of service. To ensurethe
correctness of users’ data in the cloud, we propose an
effective and flexible distributed scheme with two salient
features, opposing to its predecessors. By utilizing the
encryption keys our scheme achieves the integration of
storage correctness insurance. Unlike most prior works, the
new scheme further supports secure and efficient dynamic
operations on data blocks, including: data update,deleteand
append.
Figure1: Data Owner Module
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1143
Before logging to the cloud, user has to register their details
like user id, password. This registration will used to avoid
anonymous users. By this user will get a user name and
password for their account. Every usermustberegisterthen
only they can log in the cloud.
After that user enter their user name and password what
they registered. After log in to cloud user can manage their
cloud data.
Now user can upload the file to cloud,foreachfilesuploaded,
random private key is generated and these private keys will
encrypt the uploaded file and gets storedincloud.TripleDES
encryption algorithm is used. User can view the encrypted
file that is stored in cloud. User can select theavailableCloud
Service Provider and store the data in cloud.
Figure2: Cloud Admin module
Cloud Service Provider enter their user name andpassword.
After log in to cloud, for each user files uploaded, random
time variant public key is generated and these public keys
will encrypt the uploaded user encryptedfileandgetsstored
in cloud. TripleDES encryption algorithm is used. Cloud
Service Provider can view the encrypted file that is stored in
cloud.
Cloud Service Provider will specify the time by which file
need to be accessed, user who is going to access the file,
admin can also view the available user files that are allotted
to them. He can’t view other Cloud Service Provider files.
Now user can view the original uploaded file by specifying
time variant public key given for specific uploaded file by
Cloud Service Provider. Once again user has to enter Private
Key given for specific uploaded file. Here double decryption
is done to get the original data. If a hacker gets the access to
uploaded file, only encrypted data will be shown to him,
instead of original data.
Figure3: Upload File
We construct a revocable identity-based encryption scheme
with (cloud-aided) ciphertext evolution (RIBE-CE). Our
scheme is proved secure against chosen ciphertext attacks
based on the hardness of the BDH problem in the random
oracle model. Taking a security parameter k as input, this
algorithm outputs a master secret key msk and public
parameters params. Private-Key-Extract(params; msk; ID):
Taking params, msk and an identity ID as input, this
algorithm outputs a private key SKID, which is transmitted
to the user via a secret channel. It is run by the PKG.
Figure4: File Encryption
Time-Key-Update(params; msk; ID; t): Taking params, msk,
an identity ID and a time tag t as input, this algorithm
outputs a time key TKID;t, which is transmitted to the user
via a public channel. It is run by the PKG.
Figure5: File Decryption
Encrypt (params; ID; t; M): Taking params, ID, t and a
message M as input, this algorithm outputs a ciphertext C. It
is run by the data owner.
Decrypt (params; SKID;TKID;t):Takingparams,SKID,TKID;
t and C as input, this algorithm outputs a message M or a
failure symbol. It is run by the data user.
This application implements cloud server-enabled user
revocation, presenting an choice but greater efficient
solution to the user revocation problem in the context of
fine-grained encryption of cloud data. Meanwhile, this
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1144
strategy offers speedy access to on-demand services with
high availability and scalability. However, to avoid the need
of secret channels, public time keys need to be issued to
allow this update to occur. Consequently, it is vital to
undertake comparatively cheaper solutions to overwrite or
replace traditional systems. The scheme exploits the
properties of the modular inverse to generatea probabilistic
trapdoor which facilitates the search over the secure
inverted index table. Users with limited computing power
are however more probable to delegate the mask of the
decryption task to the cloud serverstoreducethecomputing
cost.
CONCLUSION AND FUTURE WORK
Security is a major requirementincloudcomputingwhen we
talk about data storage. Information needs protection, there
are many Security Threats, and different types of security
risks need to be discussed. In ordertoimprovingthesecurity
and protection and building the Secure Cloud, There are
number of existing techniques used to implement security.
we put forward an efficient record storage security in cloud
service. The encryption of record permits storing of the
record in straightforward and efficient way. Dynamic
operations are a further important concept where,encoding
and decoding process secures records. It also provides
method for flexible access and retrieval. Cost is reduced in
data storage. The time and space is also reduced through
storage. Also the remote data integrity checking identifies
the threats and unruly server while storing the records in
cloud guaranteeing data security. We focussed on the user
revocation problem in identity-based encryption. One ofthe
efficient revocation methods is to issue time keys
periodically via public channels for non-revoked users. We
take the scenario of cloud storage as consideration and find
that most of the existing works suffer from increasing
decryption key list or access ability to ciphertexts prior to
revocation. Though thetechniqueofproxyre-encryption can
solve the two problems, the length of the ciphertexts grow
linearly with the number of cipher text evolutions.
Therefore, it is a heavy burden to the server whenthedata is
big. Additionally, the users have to put more computation
and communication resource on re-encryption keys. This is
not suitable for source-limitedapplications.Inthispaper, we
presented an efficient solution to the two aforementioned
problems simultaneously. The size of a cipher text in the
cloud remains constant, no matter how many times the
cipher text evolves. The new revocable identity-based
encryption with cipher text evolution scheme is constructed
by using bilinear parings. The time keysaregenerated bythe
PKG periodically and sent to both the userandthecloud. The
cloud makes ciphertext evolution by using the time keys.
Hence, no extra key computations are involved in our
construction. It is efficient for the data sharing applicationin
the cloud. Our scheme enjoys provably strong security
against chosen ciphertext attacks based on standard hard
problem.
References
[1] A. Boldyreva, V. Goyal, V. Kumar, "Identity-based
encryption with efficient revocation," Proc. CCS 2008,
ACM, 2008, pp. 417-426
[2] A. Shamir, "Identity-based cryptosystems and
signature schemes," Proc. CRYPTO 1984, pp. 47-53.
[3] B. Libert and J. J. Quisquater, "Efficient revocation and
threshold pairing based cryptosystems," Proc. PODC
2003, 2003, pp. 163-171
[4] B. Qin, R. H. Deng, Y. Li, S. Liu, "Server-aided revocable
identity-based encryption," Proc. ESORICS 2015,LNCS
9326, 2015, pp. 286-304.
[5] D. Boneh, X. Boyen, "Efficient selective-ID secure
identity based encryption without random oracles,"
Proc. EUROCRYPT 2004, LNCS 3027, 2004, pp. 223-
238.
[6] D. Boneh, M. Franklin, "Identity-basedEncryptionfrom
the Weil Pairing," Proc. CRYPTO 2001, LNCS 2139,
2001, pp. 213-229
[7] J. Li, J. Li, X. Chen, C. Jia and W. Lou, "Identity-based
Encryption with Outsourced Revocation in Cloud
Computing," IEEE Transactions on Computers, 64(2),
pp. 425-437, 2015
[8] K. Liang, J. K. Liu, D. S. Wong, W. Susilo, "An efficient
cloud-based revocable identity-based proxy re-
encryption scheme for public clouds data sharing," In:
Kutyowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I.
LNCS, vol. 8712, pp. 257-272.
[9] R. Brent, "Efficient identity-based encryption without
random oracles," Proc. EUROCRYPT 2005, LNCS 3494,
2005, pp 114-127.
[10] Y. Sun, F. Zhang, L. Shen, R. H. Deng,"Efficientrevocable
certificate less encryption against decryption key
exposure," IET information security, 9(3) (2015) 158-
166

More Related Content

What's hot

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGNexgen Technology
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7Antony Law
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsShakas Technologies
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query ServiceIRJET Journal
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingCloudTechnologies
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibcLokesh Gopu
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
 
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...RSIS International
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 

What's hot (20)

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query Service
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibc
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
 
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Similar to Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries

Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...ijtsrd
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstractionpaperpublications3
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET Journal
 
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET Journal
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Ranjeet Bhalshankar
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourcednexgentech15
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computingnexgentechnology
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 

Similar to Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries (20)

Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...Enhancing Password Manager Chrome Extension through Multi Authentication and ...
Enhancing Password Manager Chrome Extension through Multi Authentication and ...
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 
C04932125
C04932125C04932125
C04932125
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1141 Efficient and Enhanced Proxy Re-Encryption Algorithm for Skyline Queries K. Kalaivani M.E, Department of CSE, SNS College of Engineering, Coimbatore, Tamil Nadu, India ABSTRACT Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic.Onepossibleapproachinachieving revocations is to update user’s decryption keys. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. It is unfortunate that this method often suffers from two problems:1)theuserhas to maintain linearly growing decryption keys; and 2) the revoked users can still access ciphertexts prior to revocation. At the first glance, proxy re- encryption technique may provide a solution to this problem, but the ciphertexts will become longer after each re-encryption, which makes it impractical. In this paper, we present a revocable identity-based encryption scheme with cloud-aidedciphertext evolution.Ourconstructionsolvesthetwo aforementioned problems via ciphertext evolution implementedbythecloud. Additionally, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen- ciphertext attacks based on the BDH problem. The comparisons with the existing related works show that our scheme enjoys better efficiency, thus is practical for the data sharing in cloud storage. How to cite this paper: K. Kalaivani "Efficient and Enhanced Proxy Re- Encryption AlgorithmforSkylineQueries" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-2, February 2020, pp.1141-1144, URL: www.ijtsrd.com/papers/ijtsrd30294.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INRODUCTION PUBLIC key encryption (PKE) provides an excellentsolution to the problem of key distribution in symmetric key. An important issue in PKE is the authenticity of user public keys. The traditional PKE authenticates user public key via releasing certificates. Nevertheless, the certificate management is a heavy burden to the public key system, which is the primary drawback in PKE. To overcome this drawback, Shamir set forth a new notion called "Identity based public key cryptography" in 1984. This public key cryptosystem employs every user’s unique identity as its public key. Therefore, the authenticityofthispublickeyis no longer questionable, and hence, there is no certificate required. Since the first practical identity-based encryption (IBE) scheme was presented by Boneh and Franklin in 2001 [3], IBE has attracted a lot of attentions from both academia and industry. To date, there have been many IBE schemes proposed in the literature. One important issue to make identity-based encryption practical is the user revocation. This problem was first discussed in BF’s seminal work. As stated earlier, different from the traditional public key system, there is no certificate in identity-based system. Therefore, the conventional user revocation technique is not applicable to the identity-based systems. Actually,theuserprivatekey can be viewed as an implicit certificate. Boneh and Franklin suggested that the PKG periodically issues new private keys by attaching time tags for non-revoked users. The user revocation can be launched by the PKG stopingtheissuing of new user private keys with the time tags. Unfortunately,this revocation system is very impractical, because the PKG has to carry heavy overhead (O(n) where nisthenumberofnon- revoked users), especially for the establishing of secret channels. Boldyreva et al. presented the first scalable revocable IBE scheme in 2008 their scheme, only public channels are required for the key updating. Furthermore, they utilized the complete subtree to realize a logarithm growth O(log(n)) of key-updating with non-revoked users. With this approach of revocation method, many revocable identity-based encryption (RIBE) schemes have been proposed. However, when taking these schemes in some application scenarios, some problems arise. Let’s consider the scenario of secure data sharing in cloud storage by applying a revocable identity-based encryption. Suppose there are four entities involved, namely the data owner, the data user, the cloud server and the PKG. To our best knowledge, the existing schemes suffer from two shortcomings or at least one of them. The data user needs to utilize the time key TKID as well as the private key to decrypt a ciphertext encrypted at the time t. So, the data user has to maintain all thetimekeys(O(t))(or decryption keys computed from time keys) for different time-period decryptions. This consumes a lot of storage resources for data users, thus itisveryimpractical especially in source-limited environments. IJTSRD30294
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1142 When a user is revoked by the PKG for such as private key compromise or expiring, the user can still decrypt those ciphertexts prior to revocation in the cloud. Though some works do not have these problems, theysuffer from new problems: the ciphertexts grow longer with the number of ciphertext-transformation (the basic construction), or the costlycomputationandcommunication of reencryption keys between the user and the server. We give a new and efficient RIBE scheme that can solve the two problems. As shown in Fig. 1, the cloud server helps a ciphertext C uploaded by the data ownerevolvetoa newone C0; then the data user decrypts the ciphertext by employing merely its current time key as well as private key. So, the data user only needs to keep one time key – the current time key; and the revoked data user cannot access any ciphertext including those before revocation; no matter how many times a ciphertext in the cloud evolves, the length of the ciphertext remains unchanged; different to proxy re- encryption, no computation or communication isneeded for the re-encryption keys. Figure1: overall architecture RELATED WORKS: Boldyreva et al. first presented a scalable revocable IBE scheme in 2008. The complete subtree structure is used to obtain a logarithm growth of updating key. This work was subsequently improved in with strong security. In 2013,Seo and Emura introduced decryption-key-exposure threat and presented a revocableIBEschemethatcanresistdecryption- key-exposure. Sun et al. extended Seo et al.’s scheme to the certificate less setting. In 2017, Watanabe et al. gave a new revocable and decryption key-exposure resistent IBE scheme. The scheme has short public parameters in prime- order groups. A very recent work showed a revocable hierarchical identity-based encryption scheme. Unfortunately, almost all these RIBE works suffer from the two drawbacks mentioned above especially in the applications like cloud storage. In 2014, Liang et al. employed proxy re-encryption technique to construct a revocable identity-based encryption scheme. Their scheme solves the two problems by re-encrypting ciphertexts in the cloud. However, the ciphertexts become longer and longer with the number of re-encryption. improved Liang et al.’s scheme on the efficiency but suffers from increasing list of decryption keys fordifferent-periodciphertexts.andpointed out the security weakness of Liang et al.’s scheme against collusion attacks. Other related works are such as In these works, the revocation is implemented by a third party e.g. the cloud server. Identity-based public key cryptography (ID-PKC) was introduced by Shamir in 1984. It is a good alternative for traditional PKC which requires high maintenance cost for certificate management. However, ID- PKC is easy to suffer from the private key escrow. To avoid this drawback, Al-Riyami and Paterson introduced the certi cateless publickeycryptography(CLPKC)in2003. The CLPKC combines the advantages of ID-PKC and traditional PKC because it has no key escrow and at the same time alleviates the certi cate management. At present, a large number of encryption and signature schemes are proposed in CLPKC. We refer readers to works. In a public key cryptosystem, an vital issue is howto revoke a user when his/her private key is leaked or the permission is expired. In traditional PKC, there exist some ripe revocation methods, such as Certi cate Revocation List (CRL), online certi cate status protocol (OCSP) and a revocationtechniqueproposed by Novomodo. In ID-PKC and CLPKC, the initial revocation technique is that the KGC periodically updates the (partial) private key for the user. However, each new key must be transmitted to the user through a secret channel. And the establishment of secret channel requires a lotofcalculations by the system and the users, which greatly increases the communication overhead.Therefore,itisbettertousepublic channels instead of secret channels when designing a revocation scheme. As matters stand, many revocation schemes with public channels have been proposed in ID- PKC. In 2008, Boldyreva et al. presented an ID-based encryption scheme with ef cient revocationn. In 2012, Tseng and Tsai and Tsai et al. constructed a revocable ID- based encryption scheme and a revocable ID-based signature scheme with batch verica-tions. In 2013, Seo and Emura proposed a revocable ID-based encryption scheme against decryption exposure Existing system In contrast to traditional solutions, where theITservicesare under proper physical, logical and personnel controls,Cloud Computing moves the application softwareanddatabasesto the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood PROPOSED SYSTEM We focus on cloud data storage security, which has always been an important aspect of quality of service. To ensurethe correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the encryption keys our scheme achieves the integration of storage correctness insurance. Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update,deleteand append. Figure1: Data Owner Module
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1143 Before logging to the cloud, user has to register their details like user id, password. This registration will used to avoid anonymous users. By this user will get a user name and password for their account. Every usermustberegisterthen only they can log in the cloud. After that user enter their user name and password what they registered. After log in to cloud user can manage their cloud data. Now user can upload the file to cloud,foreachfilesuploaded, random private key is generated and these private keys will encrypt the uploaded file and gets storedincloud.TripleDES encryption algorithm is used. User can view the encrypted file that is stored in cloud. User can select theavailableCloud Service Provider and store the data in cloud. Figure2: Cloud Admin module Cloud Service Provider enter their user name andpassword. After log in to cloud, for each user files uploaded, random time variant public key is generated and these public keys will encrypt the uploaded user encryptedfileandgetsstored in cloud. TripleDES encryption algorithm is used. Cloud Service Provider can view the encrypted file that is stored in cloud. Cloud Service Provider will specify the time by which file need to be accessed, user who is going to access the file, admin can also view the available user files that are allotted to them. He can’t view other Cloud Service Provider files. Now user can view the original uploaded file by specifying time variant public key given for specific uploaded file by Cloud Service Provider. Once again user has to enter Private Key given for specific uploaded file. Here double decryption is done to get the original data. If a hacker gets the access to uploaded file, only encrypted data will be shown to him, instead of original data. Figure3: Upload File We construct a revocable identity-based encryption scheme with (cloud-aided) ciphertext evolution (RIBE-CE). Our scheme is proved secure against chosen ciphertext attacks based on the hardness of the BDH problem in the random oracle model. Taking a security parameter k as input, this algorithm outputs a master secret key msk and public parameters params. Private-Key-Extract(params; msk; ID): Taking params, msk and an identity ID as input, this algorithm outputs a private key SKID, which is transmitted to the user via a secret channel. It is run by the PKG. Figure4: File Encryption Time-Key-Update(params; msk; ID; t): Taking params, msk, an identity ID and a time tag t as input, this algorithm outputs a time key TKID;t, which is transmitted to the user via a public channel. It is run by the PKG. Figure5: File Decryption Encrypt (params; ID; t; M): Taking params, ID, t and a message M as input, this algorithm outputs a ciphertext C. It is run by the data owner. Decrypt (params; SKID;TKID;t):Takingparams,SKID,TKID; t and C as input, this algorithm outputs a message M or a failure symbol. It is run by the data user. This application implements cloud server-enabled user revocation, presenting an choice but greater efficient solution to the user revocation problem in the context of fine-grained encryption of cloud data. Meanwhile, this
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30294 | Volume – 4 | Issue – 2 | January-February 2020 Page 1144 strategy offers speedy access to on-demand services with high availability and scalability. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. Consequently, it is vital to undertake comparatively cheaper solutions to overwrite or replace traditional systems. The scheme exploits the properties of the modular inverse to generatea probabilistic trapdoor which facilitates the search over the secure inverted index table. Users with limited computing power are however more probable to delegate the mask of the decryption task to the cloud serverstoreducethecomputing cost. CONCLUSION AND FUTURE WORK Security is a major requirementincloudcomputingwhen we talk about data storage. Information needs protection, there are many Security Threats, and different types of security risks need to be discussed. In ordertoimprovingthesecurity and protection and building the Secure Cloud, There are number of existing techniques used to implement security. we put forward an efficient record storage security in cloud service. The encryption of record permits storing of the record in straightforward and efficient way. Dynamic operations are a further important concept where,encoding and decoding process secures records. It also provides method for flexible access and retrieval. Cost is reduced in data storage. The time and space is also reduced through storage. Also the remote data integrity checking identifies the threats and unruly server while storing the records in cloud guaranteeing data security. We focussed on the user revocation problem in identity-based encryption. One ofthe efficient revocation methods is to issue time keys periodically via public channels for non-revoked users. We take the scenario of cloud storage as consideration and find that most of the existing works suffer from increasing decryption key list or access ability to ciphertexts prior to revocation. Though thetechniqueofproxyre-encryption can solve the two problems, the length of the ciphertexts grow linearly with the number of cipher text evolutions. Therefore, it is a heavy burden to the server whenthedata is big. Additionally, the users have to put more computation and communication resource on re-encryption keys. This is not suitable for source-limitedapplications.Inthispaper, we presented an efficient solution to the two aforementioned problems simultaneously. The size of a cipher text in the cloud remains constant, no matter how many times the cipher text evolves. The new revocable identity-based encryption with cipher text evolution scheme is constructed by using bilinear parings. The time keysaregenerated bythe PKG periodically and sent to both the userandthecloud. The cloud makes ciphertext evolution by using the time keys. Hence, no extra key computations are involved in our construction. It is efficient for the data sharing applicationin the cloud. Our scheme enjoys provably strong security against chosen ciphertext attacks based on standard hard problem. References [1] A. Boldyreva, V. Goyal, V. Kumar, "Identity-based encryption with efficient revocation," Proc. CCS 2008, ACM, 2008, pp. 417-426 [2] A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. CRYPTO 1984, pp. 47-53. [3] B. Libert and J. J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," Proc. PODC 2003, 2003, pp. 163-171 [4] B. Qin, R. H. Deng, Y. Li, S. Liu, "Server-aided revocable identity-based encryption," Proc. ESORICS 2015,LNCS 9326, 2015, pp. 286-304. [5] D. Boneh, X. Boyen, "Efficient selective-ID secure identity based encryption without random oracles," Proc. EUROCRYPT 2004, LNCS 3027, 2004, pp. 223- 238. [6] D. Boneh, M. Franklin, "Identity-basedEncryptionfrom the Weil Pairing," Proc. CRYPTO 2001, LNCS 2139, 2001, pp. 213-229 [7] J. Li, J. Li, X. Chen, C. Jia and W. Lou, "Identity-based Encryption with Outsourced Revocation in Cloud Computing," IEEE Transactions on Computers, 64(2), pp. 425-437, 2015 [8] K. Liang, J. K. Liu, D. S. Wong, W. Susilo, "An efficient cloud-based revocable identity-based proxy re- encryption scheme for public clouds data sharing," In: Kutyowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol. 8712, pp. 257-272. [9] R. Brent, "Efficient identity-based encryption without random oracles," Proc. EUROCRYPT 2005, LNCS 3494, 2005, pp 114-127. [10] Y. Sun, F. Zhang, L. Shen, R. H. Deng,"Efficientrevocable certificate less encryption against decryption key exposure," IET information security, 9(3) (2015) 158- 166