A Secure Data Sharing in Cloud Storage with Independent Key Generation Centre and Certificate-less Encryption
نویسنده
چکیده
305 Abstract— A mediated certificateless encryption (mCL-PKE) scheme which solves the certificate revocation problem and the key escrow problem and preserves the data confidentiality in the cloud. Since most of the CL-PKE schemes are based on bilinear pairing and computationally expensive. mCL-PKE scheme does not utilize pairing operation problem. The security mediator supports instantaneous revocation of compromised or malicious users and act as the policy enforcement scheme. This method is highly efficient than the bilinear pairing based scheme. The mCL-PKE scheme with the access control lists is been proposed to overcome the problem of sharing the sensitive information in the cloud storage. The access control list contains the details of the user and this list is generated to the cloud and the data owner for verification purpose. The main problem stated here is the key generation center in the cloud. This will bring vulnerabilities against the secure key generation. A new method is discovered to implement the key generation centre as an independent center which shares key independently. According to the access control, the data is being encrypted by the data owner using the symmetric encryption algorithm and uploads encrypted data items with an intermediate keys to the cloud. The user uses their private key to convert the partially decrypted data to the fully decrypted one. The cloud storage does not perform the decryption operation fully to preserve the data confidentiality as well as the keys information. The extension of the mCL-PKE approach allows the data owner to improvise the encryption operation in an efficient way and also to implement high level independent security in the cloud based system. The result of the mCL-PKE schemes is efficient and practical.
منابع مشابه
Fuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملA New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption
In the process of cloud data storage, data owner will encrypt data and upload it to the cloud, however, this method cannot support for encrypted data sharing. Especially, when data is shared with many users, the scalability is very weak. In order to solve this problem, we put forward a new security cloud storage data encryption scheme based on identity proxy re-encryption in this article. This ...
متن کاملSecurity Issues Related to Data Storage in Cloud
Cloud computing represents today’s most exciting computing archetype. It gives computing via internet. Cloud systems can be used to enable data sharing capabilities and this can provide abundant of benefits to the user. It is the most important trend in cloud technology for allows users to access data expediently. Privacy and security is the big challenge for stored data in cloud. Most existing...
متن کاملKey Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage
the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different enc...
متن کامل