Revocable-Storage Identity-Based Encryption: Secure Data Sharing In Cloud

Cloud computing provides a simplest way of data sharing, it provides various benefits to the users. But directly outsourcing the shared data to the cloud server will bring security issues as the data may contain valuable information. Hence, it is necessary to place cryptographically enhanced access control on the shared data, named Identity-based encryption to build a practical data sharing system. when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. Thus, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which introducing the functionalities of user revocation and cipher text update simultaneously.

[1]  Sushmita Ruj,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.

[3]  Prakash Mohan,et al.  An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password , 2017, Int. J. Inf. Secur. Priv..

[4]  Ravichandran Thangavel,et al.  Resource Selection in Grid Environment Based on Trust Evaluation Using Feedback and Performance , 2013 .

[5]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[6]  Raja Rajeswari Ch,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[7]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[8]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[9]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[10]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[11]  B. Sathyabama,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2019 .

[12]  Li Xu,et al.  Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.

[13]  Sang-Uk Shin,et al.  Certificate-Based Proxy Re-encryption for Public Cloud Storage , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[14]  Dongdong Sun,et al.  Forward-Secure Hierarchical Predicate Encryption , 2012, Pairing.

[15]  M. Prakash,et al.  Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature , 2015 .

[16]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[17]  David Pointcheval,et al.  Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.

[18]  Joseph K. Liu,et al.  An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.