Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Abstract

In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the reencrypted cipher text

Authors and Affiliations

Dayananda RB

Keywords

Related Articles

Design and Development of Hyper Spectral Image Classification Using Enhanced Mean Shift Segmentation in Image Mining

Hyper spectral imaging is becoming an important analytical tool for generating land-use map. High dimensionality in hyper spectral remote sensing data can guaranty in principle a detailed discrimination of the observed s...

Impact of ancient practices in modern society- A study report

Human civilization was boorish in earth around 5,000 BC, but social miseries are growing day by day. Matters of news papers and journals are indicating that gradually level of different kinds of negative behaviour are in...

Information Packing Ability of Transformations in Image Processing

- Image speaks more than words! We are dealing with images from Mars to Hollywood with a stop at the hospital.All of these images are compressed with the same amount of information while coming to us. So we need compress...

Influence of Red Mud Catalyst in the Catalytic Fuel Reformer

The hazardous waste material such as Waste engine oil (WEO) and red mud is recycled in this study. WEO is thermally cracked with red mud catalyst in the catalytic fuel reformer (CFR). The gas obtained from the CFR is con...

An Evaluation of Citizen Centric Service of E-Governance through E-Mitra in Jaipur

- In the developing countries the aim of the e-governance is to ensure transparent,seamless, secure and authentic flow of information fair. In this context, an attempt was made to analyze the benefits derived from 'citiz...

Download PDF file
  • EP ID EP221532
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

Dayananda RB (2015). Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment. International journal of Emerging Trends in Science and Technology, 2(1), 1699-1710. https://europub.co.uk/articles/-A-221532