Reputable Re-encryption in Unrepeatable Clouds

نویسندگان

  • S. Guna Sree
  • K. Naresh
چکیده

In our Scheme cloud computing users has to get Key information to Re Encrypt the data which has been in Encrypted to get Key information in order to decrease the number of keys used we are proposing Broadcast encryption Broadcast encryption is the cryptographic problem of delivering encrypted content over a broadcast channel in such a way that only qualified users can decrypt the content. The challenge arises from the requirement that the set of qualified users can change in each broadcast emission, and therefore revocation of individual users or user groups should be possible using broadcast transmissions, only, and without affecting any remaining users. As efficient revocation is the primary objective of broadcast encryption solutions are also referred to as revocation schemes. Rather than directly encrypting the content for qualified users, broadcast encryption schemes distribute keying information that allows qualified users to reconstruct the content encryption key whereas revoked users find insufficient information to recover the key. The typical setting considered is that of a unidirectional broadcaster and stateless users which is especially challenging. In contrast, the scenario where users are supported with a bi-directional communication link with the broadcaster and thus can more easily maintain their state, and where users are not only dynamically revoked but also added (joined), is often referred to as multicast encryption. Keywords—Element-based encryption; cloud computing; substitute re-encryption

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reputable Mix Networks

We define a new type of mix network that offers a reduced form of robustness: the mixnet can prove that every message it outputs corresponds to an input submitted by a player without revealing which input (for honest players). We call mixnets with this property reputable mixnets. Reputable mixnets are not fully robust, because they offer no guarantee that distinct outputs correspond to distinct...

متن کامل

Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation

We consider the problems of i) using public-key encryption to enforce dynamic access control on clouds; and ii) key rotation of data stored on clouds. Historically, proxy re-encryption, ciphertext delegation, and related technologies have been advocated as tools that allow for revocation and the ability to cryptographically enforce dynamic access control on the cloud, and more recently they hav...

متن کامل

An Improved Scheme for Protecting Medical Data in Public Clouds

Public Clouds offer a convenient way for storing and sharing the large amounts of medical data that are generated by, for example, wearable health monitoring devices. Nevertheless, using a public infrastructure raises significant security and privacy concerns. Even if the data are stored in an encrypted form, the data owner should share some information with the Cloud provider in order to enabl...

متن کامل

Preserving Privacy of Public Clouds through Access Control Mechanisms: A Review

Enforcing privacy on public clouds through access control mechanisms are currently based on Single Layer Encryption. Under Single Layer Encryption, data owners should upload data on the cloud after encrypting them and have to re-encrypt the data whenever access policies or user profiles are changed. This could increase the communication and computational costs at data owners. A better approach ...

متن کامل

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy ReEncryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013