ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 6)

Publication Date:

Authors : ; ;

Page : 1314-1316

Keywords : Identity Based Encryption; Attribute Based Encryption; Pseudonym;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator (PKG). However, one of the main drawback of IBE is overheaded computation at PKG during user revocation. The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key-issuing and key-update process leaving only a number of simple operations for PKG and users to perform locally. For this, we generate a hybrid private key for each user, in which an AND gate is used to connect and bound the identity component and time component. But KU-CSP is untrusted. So, we propose a Pseudonym Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We generate pseudonym for each users to hide users original identity. along with this we increase the security by combining the techniques Identity Based Encryption and Attribute Based Encryption. also we use multiple KU-CSP for load balancing purpose. For integrity checking, we generate signature before uploading the data in cloud. Using this signature integrity of the file is verified.

Last modified: 2021-07-01 14:39:08