Certificateless Encryption In Public Cloud For Secure Data Transmission

A mediated certificate-less encryption that doesn’t involves pair up operations for safely sharing confidential information and data in public clouds. The approach of using Mediated certificate-less public key encryption (mCL PKE) provides the solution for the fair cryptography problem which is present in name based encryption and certificate annulment problem associated with public key cryptography. However, existing mCLPKE encryption schemes are either inadequate for the problem because it requires the use of very costly connection operations or they are vulnerable against the hackers attack to partial decrypt the data. To describe the functioning and data cofidentiality, in this paper, we have first given a mCL PKE scheme without involving pairing operations. We are using our mCL PKE scheme to obtain a practical solution to the problems of sharing critical and confidential information in cloud computing environment involving large number of clients. The cloud is used as a secure storage which is also having key generation station. In our system, the data owner encrypts his confidential data by using the cloud generated users’ public keys which is based on its access monitoring policies and uploads the encrypted data on the cloud. After successful authorization, the cloud partially decrypts the encrypted confidential data for the authorized users. The user now can fully access the encrypted code by utilizing his own private key given to him.

[1]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .

[2]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[3]  Larry L. Peterson,et al.  Reasoning about naming systems , 1993, TOPL.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  George Forman,et al.  An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..

[6]  Dan Boneh,et al.  Fine-grained control of security capabilities , 2004, TOIT.

[7]  Gary Marchionini,et al.  A study on video browsing strategies , 1997 .

[8]  Hong Hua,et al.  A widget framework for augmented interaction in SCAPE , 2003, UIST '03.

[9]  Yuen-Tak Yu,et al.  A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..

[10]  Bernd Fröhlich,et al.  The cubic mouse: a new device for three-dimensional input , 2000, CHI.

[11]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[12]  Michael Sannella,et al.  Constraint satisfaction and debugging for interactive user interfaces , 1994 .

[13]  Matthew Green,et al.  Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.

[14]  Jan Camenisch,et al.  Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..