Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

نویسندگان

چکیده

Cloud storage is a service involving cloud providers providing space to customers. services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users outsource data in the cloud. However, directly via stage that are unsafe when outsourcing sensitive for users. Therefore, cipher text-policy attribute-based encryption promising cryptographic solution environment, can be drawn up access control by owners (DO) define policy. Unfortunately, an outsourced architecture applied with introduces challenges, revocation. This issue threat security of DO. Furthermore, highly secure flexible text-based attribute role hierarchy user grouping implemented extending KUNodes (revocation) identity-based encryption. Result evaluated using Cloudsim, our algorithm outperforms terms computational cost consuming 32 MB 150-MB files.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revocable Hierarchical Identity-Based Encryption with Adaptive Security

Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectively secure RHIBE schemes were proposed, but it is still unsolved problem to construct an adaptively secure RHIBE scheme. In this work, we propose two RHIBE schemes in composite-order bilinear group...

متن کامل

Revocable Identity-Based Encryption Revisited: Security Model and Construction

In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE). One of the significant benefit of their construction is scalability, where the overhead of the trusted authority is logarithmically increased in the number of users, whereas that in the Boneh-Franklin naive revocation way is lin...

متن کامل

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identi...

متن کامل

Data Sharing in Cloud Computing Using ( RS - IBE ) Revocable Storage Identity - Based Encryption Method

Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identi...

متن کامل

Adaptive-ID Secure Revocable Identity-Based Encryption

Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has been thoroughly studied in PKIs, few revocation mechanisms are known in the IBE setting. Until quite recently, the most convenient one was to augment identities with period numbers at encryption. All non-revoked receivers were thus ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2022

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2022.019508