SlideShare a Scribd company logo
1 of 7
Download to read offline
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Abstract:
ID-based encryption, or Identity-Based Encryption (IBE), is an important
primitive of ID-based cryptography. As such it is a type of public-
key encryption in which the public key of a user is some unique information about
the identity of the user (e.g. a user's email address). Identity-Based Encryption
which simplifies the public key and certificate management at Public Key
Infrastructure (PKI) is an important alternative to public key encryption. However,
one of the main efficiency drawbacks of IBE is the overhead computation at
Private Key Generator (PKG) during user revocation. Efficient revocation has been
well studied in traditional Public Key Infrastructure setting, but the cumbersome
management of certificates is precisely the burden that IBE strives to alleviate. So
propose a revocable IBE scheme in the server aided setting. Our scheme offloads
most of the key generation related operations during key-issuing and key-update
processes to a Key Update Cloud Service Provider, leaving only a constant number
of simple operations for Private Key Generator and users to perform locally. This
goal is achieved by utilizing a novel collusion-resistant technique: we employ a
hybrid private key for each user.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Existing System:
In an existing system approach users renew their private keys periodically
and senders use the receivers’ identities concatenated with current time period. But
this mechanism would result in an overhead load at Private Key Generator. In
another word, all the users regardless of whether their keys have been revoked or
not, have to contact with PKG periodically to prove their identities and update new
private keys.
Similarly consider a revocable IBE scheme. This scheme is built on the idea
of fuzzy IBE but utilizinga binary tree data structure to record user’s identities at
leaf nodes. Therefore, key-update efficiency at PKG is able to be significantly
reduced from linear to the height of such binary tree (i.e. logarithmic in the number
of users).
The size of private key grows in logarithmic in the number of users in
system, which makes it difficult in private key storage for users. As the number of
users in system grows, PKG has to maintain a binary tree with a large amount of
nodes, which introduces another bottleneck for the global system.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
In practice the public clouds are likely outside of the same trusted domain of
users and are curious for users’ individual privacy. For this reason, a challenge on
how to design a secure revocable IBE scheme to reduce the overhead computation
at PKG with a UN trusted CSP is raised.
In order to maintain decrypt ability, unrevoked users needs to periodically
request on key update for time component to a newly introduced entity named Key
Update Cloud Service Provider (KU-CSP).
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Drawbacks:
 Identity-based systems have a characteristic problem in operation. Suppose
Alice and Bob are users of such a system. Since the information needed to
find Alice's public key is completely determined by Alice's ID and the
master public key.
 It is not possible to revoke Alice's credentials and issue new credentials
without either (a) changing Alice's ID (usually a phone number or an email
address which will appear in a corporate directory); or (b) changing the
master public key and re issuing private keys to all users, including Bob.
This limitation may be overcome by including a time component in the identity.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Proposed System:
In cloud computing environment the Identity based Encryption with
outsourced revocation techniques consist of the key service procedures including
key-issuing, key-update and revocation in proposed IBE scheme with outsourced
revocation work as follows. Key issuing, key updating and revocation.
Our proposed system follows a way for users to periodically renew their
private keys without interacting with PKG. However, the assumption required in
their work is that each user needs to possess a tamper-resistant hardware device. a
special semi trusted third party called a mediator who helps users to decrypt each
cipher text.
If an identity is revoked then the mediator is instructed to stop helping the
user. Obviously, it is impractical since all users are unable to decrypt on their own
and they need to communicate with mediator for each decryption.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
The KU-CSP provides computing service in the Infrastructure as a service
(IaaS) model, which provides the raw materials of cloud computing, such as
processing, storage and other forms of lower level network and hardware resources
in a virtual, on demand manner via the Internet.
Differing from traditional hosting services with which physical servers or
parts thereof are rented on a monthly or yearly basis, the cloud infrastructure is
rented as virtual machines on a per-use basis and can scale in and out dynamically,
based on customer needs. Such on demand scalability is enabled by the recent
advancements in virtualization and network management.
IaaS users do not need to manage or control the underlying cloud
infrastructure but have control over operating systems, storage, deployed
applications, and in some cases limited control of select networking components
(e.g. host firewalls). specify that in this work we also aim to utilize outsourcing
computation technique to deliver overhead computation to KU-CSP so that PKG is
able to be offline in key-update.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Also proposed a space efficient revocable IBE mechanism from non-
monotonic Attribute-Based Encryption (ABE), but their construction requires
times bilinear pairing operations for a single decryption where the number of
revoked users is.
Advantages:
 Highly secure Encryption techniques.
 Data confidentiality and reliability is fully configured.
 Computational performance is good.

More Related Content

What's hot

Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_ResumeSagar Ware
 
Summer trainingsoftware 2011
Summer trainingsoftware 2011Summer trainingsoftware 2011
Summer trainingsoftware 2011dkhari
 
What is NetOps? | NetOps Transformation
What is NetOps? | NetOps TransformationWhat is NetOps? | NetOps Transformation
What is NetOps? | NetOps TransformationAppViewX
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume Qiang Yu
 
Industrial trainingvlsi design-2011
Industrial trainingvlsi design-2011Industrial trainingvlsi design-2011
Industrial trainingvlsi design-2011dkhari
 
Sujayan-Resume
Sujayan-ResumeSujayan-Resume
Sujayan-ResumeSujayan Pn
 
InterVision
InterVisionInterVision
InterVisionqtomlin
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 ExternalSarah Thomas
 
Sanjay kumar joshi
Sanjay kumar joshiSanjay kumar joshi
Sanjay kumar joshiSanjay Joshi
 

What's hot (19)

Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
 
HEENA ARORA
HEENA ARORAHEENA ARORA
HEENA ARORA
 
CV_AmitVohra
CV_AmitVohraCV_AmitVohra
CV_AmitVohra
 
Ahmed Hassan CV_amin4
Ahmed Hassan CV_amin4Ahmed Hassan CV_amin4
Ahmed Hassan CV_amin4
 
Harvinder Singh-Resume
Harvinder Singh-ResumeHarvinder Singh-Resume
Harvinder Singh-Resume
 
Summer trainingsoftware 2011
Summer trainingsoftware 2011Summer trainingsoftware 2011
Summer trainingsoftware 2011
 
What is NetOps? | NetOps Transformation
What is NetOps? | NetOps TransformationWhat is NetOps? | NetOps Transformation
What is NetOps? | NetOps Transformation
 
Qiang Yu Resume
Qiang Yu Resume Qiang Yu Resume
Qiang Yu Resume
 
Anup Rungta
Anup RungtaAnup Rungta
Anup Rungta
 
RAHUL RAWAT
RAHUL RAWATRAHUL RAWAT
RAHUL RAWAT
 
Resume
ResumeResume
Resume
 
Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
 
Industrial trainingvlsi design-2011
Industrial trainingvlsi design-2011Industrial trainingvlsi design-2011
Industrial trainingvlsi design-2011
 
Sujayan-Resume
Sujayan-ResumeSujayan-Resume
Sujayan-Resume
 
RadhaKrishna Votti_CV
RadhaKrishna Votti_CVRadhaKrishna Votti_CV
RadhaKrishna Votti_CV
 
InterVision
InterVisionInterVision
InterVision
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
Mohamed Said
Mohamed SaidMohamed Said
Mohamed Said
 
Sanjay kumar joshi
Sanjay kumar joshiSanjay kumar joshi
Sanjay kumar joshi
 

Viewers also liked

Curso de formación (ficticio)
Curso de formación (ficticio)Curso de formación (ficticio)
Curso de formación (ficticio)Pablo Sg25
 
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...Georgios Pagkakis
 
Richard Samuel: 'Big Data - Setting the Scene'
Richard Samuel: 'Big Data - Setting the Scene'Richard Samuel: 'Big Data - Setting the Scene'
Richard Samuel: 'Big Data - Setting the Scene'Health Innovation Wessex
 
Secure Routing Protocol
Secure Routing ProtocolSecure Routing Protocol
Secure Routing ProtocolKentaMuranaka
 
Joseph Flory VMET_Document(TRANSCRIPT)
Joseph Flory VMET_Document(TRANSCRIPT)Joseph Flory VMET_Document(TRANSCRIPT)
Joseph Flory VMET_Document(TRANSCRIPT)Joseph Flory
 
Rpp Penyelenggaraan Jenazah
Rpp Penyelenggaraan JenazahRpp Penyelenggaraan Jenazah
Rpp Penyelenggaraan JenazahAmalia Sofitri
 
Eliecer falcon.
Eliecer falcon.Eliecer falcon.
Eliecer falcon.uftsaia
 
Tenant services hawaii
Tenant services hawaiiTenant services hawaii
Tenant services hawaiiCertifiedps
 
Deceuninck's Fully Reversible Window
Deceuninck's Fully Reversible WindowDeceuninck's Fully Reversible Window
Deceuninck's Fully Reversible WindowDeceuninck UK
 

Viewers also liked (14)

Curso de formación (ficticio)
Curso de formación (ficticio)Curso de formación (ficticio)
Curso de formación (ficticio)
 
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...
Territorial-study-of-the-distribution-of-the-Woodlark-Lullula-arborea-and-the...
 
Mark Edwards
Mark EdwardsMark Edwards
Mark Edwards
 
Richard Samuel: 'Big Data - Setting the Scene'
Richard Samuel: 'Big Data - Setting the Scene'Richard Samuel: 'Big Data - Setting the Scene'
Richard Samuel: 'Big Data - Setting the Scene'
 
Secure Routing Protocol
Secure Routing ProtocolSecure Routing Protocol
Secure Routing Protocol
 
Joseph Flory VMET_Document(TRANSCRIPT)
Joseph Flory VMET_Document(TRANSCRIPT)Joseph Flory VMET_Document(TRANSCRIPT)
Joseph Flory VMET_Document(TRANSCRIPT)
 
WORDPRESS SÄKERHET
WORDPRESS SÄKERHETWORDPRESS SÄKERHET
WORDPRESS SÄKERHET
 
Networking 101
Networking 101Networking 101
Networking 101
 
Rpp Penyelenggaraan Jenazah
Rpp Penyelenggaraan JenazahRpp Penyelenggaraan Jenazah
Rpp Penyelenggaraan Jenazah
 
Eliecer falcon.
Eliecer falcon.Eliecer falcon.
Eliecer falcon.
 
Tenant services hawaii
Tenant services hawaiiTenant services hawaii
Tenant services hawaii
 
rajesh (1) (1)
rajesh (1) (1)rajesh (1) (1)
rajesh (1) (1)
 
Deceuninck's Fully Reversible Window
Deceuninck's Fully Reversible WindowDeceuninck's Fully Reversible Window
Deceuninck's Fully Reversible Window
 
Farmaco sinusitis aguda
Farmaco sinusitis agudaFarmaco sinusitis aguda
Farmaco sinusitis aguda
 

Similar to Identity based encryption

Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...kitechsolutions
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithmskitechsolutions
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolationkitechsolutions
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networkskitechsolutions
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...kitechsolutions
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoringkitechsolutions
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelFinalyearprojects Toall
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsFinalyearprojects Toall
 
Secure-Net Technologies
Secure-Net TechnologiesSecure-Net Technologies
Secure-Net TechnologiesNamita Mahajan
 
Joby_Resume_Network Engineer
Joby_Resume_Network EngineerJoby_Resume_Network Engineer
Joby_Resume_Network EngineerJoby Mon
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFinalyearprojects Toall
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFinalyearprojects Toall
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Cegonsoft Fames
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Cegonsoft Fames
 

Similar to Identity based encryption (20)

Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
 
Assurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment modelAssurance of security and privacy requirements for cloud deployment model
Assurance of security and privacy requirements for cloud deployment model
 
Identity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasetsIdentity based private matching over outsourced encrypted datasets
Identity based private matching over outsourced encrypted datasets
 
Lasitha_Konara_CV
Lasitha_Konara_CVLasitha_Konara_CV
Lasitha_Konara_CV
 
Ahmed cv
Ahmed cvAhmed cv
Ahmed cv
 
Secure-Net Technologies
Secure-Net TechnologiesSecure-Net Technologies
Secure-Net Technologies
 
Joby_Resume_Network Engineer
Joby_Resume_Network EngineerJoby_Resume_Network Engineer
Joby_Resume_Network Engineer
 
Resume_Avik
Resume_AvikResume_Avik
Resume_Avik
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
Follow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile usersFollow me cloud-when cloud services follow mobile users
Follow me cloud-when cloud services follow mobile users
 
RICKY F DAGUM
RICKY F DAGUMRICKY F DAGUM
RICKY F DAGUM
 
ES_Resume
ES_ResumeES_Resume
ES_Resume
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Identity based encryption

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Abstract: ID-based encryption, or Identity-Based Encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public- key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). Identity-Based Encryption which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional Public Key Infrastructure setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. So propose a revocable IBE scheme in the server aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for Private Key Generator and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user.
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Existing System: In an existing system approach users renew their private keys periodically and senders use the receivers’ identities concatenated with current time period. But this mechanism would result in an overhead load at Private Key Generator. In another word, all the users regardless of whether their keys have been revoked or not, have to contact with PKG periodically to prove their identities and update new private keys. Similarly consider a revocable IBE scheme. This scheme is built on the idea of fuzzy IBE but utilizinga binary tree data structure to record user’s identities at leaf nodes. Therefore, key-update efficiency at PKG is able to be significantly reduced from linear to the height of such binary tree (i.e. logarithmic in the number of users). The size of private key grows in logarithmic in the number of users in system, which makes it difficult in private key storage for users. As the number of users in system grows, PKG has to maintain a binary tree with a large amount of nodes, which introduces another bottleneck for the global system.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com In practice the public clouds are likely outside of the same trusted domain of users and are curious for users’ individual privacy. For this reason, a challenge on how to design a secure revocable IBE scheme to reduce the overhead computation at PKG with a UN trusted CSP is raised. In order to maintain decrypt ability, unrevoked users needs to periodically request on key update for time component to a newly introduced entity named Key Update Cloud Service Provider (KU-CSP).
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Drawbacks:  Identity-based systems have a characteristic problem in operation. Suppose Alice and Bob are users of such a system. Since the information needed to find Alice's public key is completely determined by Alice's ID and the master public key.  It is not possible to revoke Alice's credentials and issue new credentials without either (a) changing Alice's ID (usually a phone number or an email address which will appear in a corporate directory); or (b) changing the master public key and re issuing private keys to all users, including Bob. This limitation may be overcome by including a time component in the identity.
  • 5. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Proposed System: In cloud computing environment the Identity based Encryption with outsourced revocation techniques consist of the key service procedures including key-issuing, key-update and revocation in proposed IBE scheme with outsourced revocation work as follows. Key issuing, key updating and revocation. Our proposed system follows a way for users to periodically renew their private keys without interacting with PKG. However, the assumption required in their work is that each user needs to possess a tamper-resistant hardware device. a special semi trusted third party called a mediator who helps users to decrypt each cipher text. If an identity is revoked then the mediator is instructed to stop helping the user. Obviously, it is impractical since all users are unable to decrypt on their own and they need to communicate with mediator for each decryption.
  • 6. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com The KU-CSP provides computing service in the Infrastructure as a service (IaaS) model, which provides the raw materials of cloud computing, such as processing, storage and other forms of lower level network and hardware resources in a virtual, on demand manner via the Internet. Differing from traditional hosting services with which physical servers or parts thereof are rented on a monthly or yearly basis, the cloud infrastructure is rented as virtual machines on a per-use basis and can scale in and out dynamically, based on customer needs. Such on demand scalability is enabled by the recent advancements in virtualization and network management. IaaS users do not need to manage or control the underlying cloud infrastructure but have control over operating systems, storage, deployed applications, and in some cases limited control of select networking components (e.g. host firewalls). specify that in this work we also aim to utilize outsourcing computation technique to deliver overhead computation to KU-CSP so that PKG is able to be offline in key-update.
  • 7. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Also proposed a space efficient revocable IBE mechanism from non- monotonic Attribute-Based Encryption (ABE), but their construction requires times bilinear pairing operations for a single decryption where the number of revoked users is. Advantages:  Highly secure Encryption techniques.  Data confidentiality and reliability is fully configured.  Computational performance is good.