ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Identity-Based Authentication with Efficient Traceable System in Cloud Storage

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 1)

Publication Date:

Authors : ; ; ; ; ;

Page : 137-143

Keywords : Authorized Penetrating Encryption; Traceability; Multiple Keywords Subset Search;

Source : Downloadexternal Find it from : Google Scholarexternal


Secure search over encrypted remote data is crucial in cloud computing to ensure data privacy and usability. To prevent unofficial data access and usage fine-grained access control is important in the multiuser system. Whereas, an authorized user may intentionally leak the secret key for financial benefit. So, tracing and revoking such maltreat user who abuses secret key needs to be solved. The key escrow free procedure can be used which will effectively prevent the Key Generation Centre (KGC) from unprincipled searching and decrypt all encrypted files of users. The decryption process involves here only requires ultra-lightweight computation, which is a desirable feature for energy-limited devices. If we figure out malevolent user we can efficiently revoke that user. Again if we have adaptable multiple keywords subset search pattern, which will also not affect the order of search results.

Last modified: 2020-02-03 00:54:39