Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
نویسندگان
چکیده
Cloud storage is a service involving cloud providers providing space to customers. services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users outsource data in the cloud. However, directly via stage that are unsafe when outsourcing sensitive for users. Therefore, cipher text-policy attribute-based encryption promising cryptographic solution environment, can be drawn up access control by owners (DO) define policy. Unfortunately, an outsourced architecture applied with introduces challenges, revocation. This issue threat security of DO. Furthermore, highly secure flexible text-based attribute role hierarchy user grouping implemented extending KUNodes (revocation) identity-based encryption. Result evaluated using Cloudsim, our algorithm outperforms terms computational cost consuming 32 MB 150-MB files.
منابع مشابه
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectively secure RHIBE schemes were proposed, but it is still unsolved problem to construct an adaptively secure RHIBE scheme. In this work, we propose two RHIBE schemes in composite-order bilinear group...
متن کاملRevocable Identity-Based Encryption Revisited: Security Model and Construction
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE). One of the significant benefit of their construction is scalability, where the overhead of the trusted authority is logarithmically increased in the number of users, whereas that in the Boneh-Franklin naive revocation way is lin...
متن کاملSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identi...
متن کاملData Sharing in Cloud Computing Using ( RS - IBE ) Revocable Storage Identity - Based Encryption Method
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identi...
متن کاملAdaptive-ID Secure Revocable Identity-Based Encryption
Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has been thoroughly studied in PKIs, few revocation mechanisms are known in the IBE setting. Until quite recently, the most convenient one was to augment identities with period numbers at encryption. All non-revoked receivers were thus ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2022
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2022.019508