Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Abstract

In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the reencrypted cipher text

Authors and Affiliations

Dayananda RB

Keywords

Related Articles

Characterization of Nanocrystalline Nickel Doped Titanium -Dioxide, Synthesized by Co Precipitation Method.

The recent trend in the field of semiconducting technology is the fabrication of nanoscaled semiconductor devices which have diversified applications in various fields of science and technology. In the present study thre...

Extracting Learning Concepts from E-books

This paper presents the algorithmic formulation to automatically extract the learning concepts from eBook and generate the RDF (Resource Description Framework) data which can be utilized for numerous purposes. The framew...

Plagiarism in Mexican Engineering Students

The present work investigates the index of plagiarism in dissertations in the field of engineering at an undergraduate level in a higher education institution in Mexico. Through the on-line program SafeAssign, we analyze...

Diffusion in Artificial Kidney (Haemodialyser)

In this paper the diffusion equation is solved by separation of variable method and analyzed Frobenius infinite series approximation. Finally, I have written a computer program using Turbo C++ and simulate the method for...

Wireless Networks

The arrival of wireless technology has reduced the human efforts for accessing data at various locations by replacing wired infrastructure with wireless infrastructure and also providing access to devices having mobility...

Download PDF file
  • EP ID EP221532
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Dayananda RB (2015). Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment. International journal of Emerging Trends in Science and Technology, 2(1), 1699-1710. https://europub.co.uk/articles/-A-221532