A Secure Data Sharing in Cloud Storage with Independent Key Generation Centre and Certificate-less Encryption

نویسنده

  • Zhongmei Wan
چکیده

305 Abstract— A mediated certificateless encryption (mCL-PKE) scheme which solves the certificate revocation problem and the key escrow problem and preserves the data confidentiality in the cloud. Since most of the CL-PKE schemes are based on bilinear pairing and computationally expensive. mCL-PKE scheme does not utilize pairing operation problem. The security mediator supports instantaneous revocation of compromised or malicious users and act as the policy enforcement scheme. This method is highly efficient than the bilinear pairing based scheme. The mCL-PKE scheme with the access control lists is been proposed to overcome the problem of sharing the sensitive information in the cloud storage. The access control list contains the details of the user and this list is generated to the cloud and the data owner for verification purpose. The main problem stated here is the key generation center in the cloud. This will bring vulnerabilities against the secure key generation. A new method is discovered to implement the key generation centre as an independent center which shares key independently. According to the access control, the data is being encrypted by the data owner using the symmetric encryption algorithm and uploads encrypted data items with an intermediate keys to the cloud. The user uses their private key to convert the partially decrypted data to the fully decrypted one. The cloud storage does not perform the decryption operation fully to preserve the data confidentiality as well as the keys information. The extension of the mCL-PKE approach allows the data owner to improvise the encryption operation in an efficient way and also to implement high level independent security in the cloud based system. The result of the mCL-PKE schemes is efficient and practical.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption

In the process of cloud data storage, data owner will encrypt data and upload it to the cloud, however, this method cannot support for encrypted data sharing. Especially, when data is shared with many users, the scalability is very weak. In order to solve this problem, we put forward a new security cloud storage data encryption scheme based on identity proxy re-encryption in this article. This ...

متن کامل

Security Issues Related to Data Storage in Cloud

Cloud computing represents today’s most exciting computing archetype. It gives computing via internet. Cloud systems can be used to enable data sharing capabilities and this can provide abundant of benefits to the user. It is the most important trend in cloud technology for allows users to access data expediently. Privacy and security is the big challenge for stored data in cloud. Most existing...

متن کامل

Key Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage

the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different enc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015