Characteristics Based Encoding Data Key Update CSP with Outsourced Revocation in Cloud Computing
Journal: International Journal of Progressive Sciences and Technologies (IJPSAT) (Vol.3, No. 1)Publication Date: 2016-07-01
Authors : Sai Rajesh Nalamati; Sriram Srujan;
Page : 87-98
Keywords : Characteristics-based encryption (CBE); revocation; outsourcing; cloud computing;
Abstract
Characteristics-Based Encryption (CBE) which simplifies the public key and permit managing at Public Key Infrastructure (PKI) is an imperative different to public key encode. However, one of the major effectiveness problems of CBE is the overhead division at Private Key Generator (PKG) through user revocation. Proficient revocation has been glowing intentional in traditional PKI setting, but the burdensome managing of certificates is accurately the burden that CBE strives to alleviate. In this paper, planed at tackle the important issue of identity revocation, we intro outsourcing computation into CBE for the first time and suggest a revocable CBE system in the server-aided setting. Our system offloads most of the key generation allied operations through key-issuing and key-update procedure to a Key Update Cloud Service Provider (CSP), departure only a constant number of easy operations for PKG and users to make local. This goal is reached by utilizing a novel collusion-resistant method: we utilize a hybrid private key for every user, in which an AND gate is concerned to connect and jump the identity constituent and the time component. Moreover, we propose another building which is provable locked under the newly formulized Referred Delegation of Computation replica. Finally, we provide widespread experimental results to exhibit the efficiency of our proposed structure.
Other Latest Articles
- Spatial Interpolation Algorithm For Error Concealment
- Analysis of Evolutionary Debunking Arguments by Greene and Singer
- Effect of Taxes and Government Laws on Cigarette Industry in India
- Protecting the Kantian Cult
- A Comparative Study - Selection of Optimal Traffic Signal using Graph Theory and Data Mining
Last modified: 2017-09-18 05:29:39