Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2

Abstract

Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party service providers, the major challenge that might arise is the security. To ensure the security, data’s are stored in the encrypted formats. Here the data access control would be more difficult problem where the data access needs to be limited for the available users. In this work, identity based encryption is used to limit the dataaccess permission for the users by encrypting the data contents using the unique identity information. The identity based encryption is done in the block level to control the data contents that are provided to the users. To ensure thesecurity from the malicious users, this work introduces the user revocation scheme. Revocation process is outsourced to the key update server to reduce the burden of private key generator. The overall burden of revokedusers is eliminated by separating the key updation process from the data server. The key updation server is splitted and distributed to the different components such updation key generation process to the key updation server and the key updation process to the individual users. The experimental tests conducted by proved that the proposed methodology provides better result than the existing approach in terms of improved security level.

Authors and Affiliations

S. Dhivya , P. Senthil

Keywords

Related Articles

Enhancing Security Of Publish/Subscribe System Using Identity Based Encryption Model

Abstract: In a content based publish subscribe system providing security related to the events or messages and subscriptions is very difficult. This paper presents approach to provide security in a Broker-less Publish/Su...

 Occlusion detection in video sequences

Abstract: An occlusion is the region between two overlapping objects with disparate motion. Detecting these occluded objects is crucial for many of the video processing. The Occlusion detection is decomposed into two ind...

 An efficient process mining model for Petri Nets in process discovery

 Abstract: Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining...

Semantic Similarity Search Model for Obfuscated Plagiarism Detection in Marathi Language using Fuzzy and Naïve Bayes Approaches

Abstract: Plagiarism detection (PD) in natural language texts is an example of NLP applications that is linked with information retrieval (IR) and soft computing (SC) approaches. Obfuscated plagiarism cases contain invis...

“Design and Detection of Mobile Botnet Attacks”

Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation m...

Download PDF file
  • EP ID EP138646
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

S. Dhivya, P. Senthil (2016).  Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing. IOSR Journals (IOSR Journal of Computer Engineering), 18(2), 114-117. https://europub.co.uk/articles/-A-138646