Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Abstract

In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the reencrypted cipher text

Authors and Affiliations

Dayananda RB

Keywords

Related Articles

Combining Ability Analysis for Qualitative Characters in Indian Hexaploid Wheat

Combining ability effects were estimated in line x tester crossing programme for five characters involving four lines and three testers in Triticum durum. It revealed preponderance of non-additive gene action for protein...

Efficient High Utility Top-K Frequent Pattern Mining

High utility pattern mining can be defined as discovering sets of patterns that not only co-occurs but they carry high profit. In two-phase pattern mining an apriori algorithm is used for candidate generation. However ca...

Improved Technique by Integrating AHP-TOPSIS for Prioritization

Requirements prioritization is used to minimize risk during development of the software project, so that the most important requirements are implemented first. There are many prioritization techniques are available to pr...

PFC Zeta Converter for Speed Control of PMBLDC Motor Drive

This paper presents a Zeta DC-DC converter as a power factor correction (PFC) converter which is operated in voltage control mode for speed control of a permanent magnet brushless DC motor (PMBLDCM). The proposed convert...

Automatic College Bell Using Raspberry-Pi

The world over the decades has made considerable advancement in automation, au-tomation is employed in every sector whether it is home or industry. Here a new and inexpensive design is being presented. This design a trem...

Download PDF file
  • EP ID EP221532
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Dayananda RB (2015). Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment. International journal of Emerging Trends in Science and Technology, 2(1), 1699-1710. https://europub.co.uk/articles/-A-221532