Secure Data Sharing In Cloud Computing Using Revocable-storage Identity-base

SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY, VOL. 01, APR 2020 PP.(47-51)
Abstract– The ability to share data in a manner that is both flexible and convenient thanks to cloud computing brings a variety of benefits to individuals as well as to society as a whole. These benefits can be broken down into two categories: individual benefits and societal benefits. Because the data frequently contain valuable information, users have a natural reluctance to directly outsource the shared data to the cloud server. This is because the data contain valuable information. As a consequence of this, it is absolutely necessary to implement an access control system that is bolstered by cryptography and is applied to the data that is shared. Identity-based encryption is an intriguing example of a cryptographic primitive that shows promise for use in the construction of a data-sharing system that is both secure and usable. However, the access control system is not a permanent fixture. In other words, there should be a mechanism that can remove a user from the system when that user’s authorization has run out and the authorization has expired. This would be the same as saying that the authorization has expired. The revoked user is prevented from accessing any data that was either previously or subsequently shared as a direct result of this action. We propose the use of a concept that we refer to as revocable-storage identity-based encryption, or RS-IBE for short, in the hopes of accomplishing this objective. By simultaneously introducing the functionalities of user revocation and ciphertext update, RS-IBE is able to provide both forward and backward security for ciphertext. In addition to this, we present a concrete construction of RS-IBE and demonstrate that it is secure within the framework of the security model that we defined. The performance comparisons demonstrate that the suggested RS-IBE scheme possesses advantages in terms of functionality and efficiency. As a consequence, it is plausible that a system that is both practically applicable and cost-effective for sharing data could be developed using this scheme. In the end, we will show that the proposed plan can work by showing the results of putting it into action and finding that it worked.
Index Terms – cloud computing; storage; Identity-base
REFERENCE

1. Lee, K., 2018. Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption”. IEEE Transactions on Cloud Computing, 8(4), pp.1299-1300.
2. Shavali, T.S., Khan, M.P.A. and AbdulRasool, M., SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION.
3. Deshmukh, S., Dhivare, S. and Dagade, M.H., Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption.
4. Raju, K.R., Lakshmi, D.R. and Someswar, G.M., 2018. RETRACTED: SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION.
5. Zhao, Y., Ren, M., Jiang, S., Zhu, G. and Xiong, H., 2019. An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing, 101(8), pp.1041-1065.
6. Wei, J., Chen, X., Huang, X., Hu, X. and Susilo, W., 2019. RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e- health records in public cloud. IEEE Transactions on Dependable and Secure Computing, 18(5), pp.2301-2315.
7. Daudkar, N., Dhore, P. and Balani, N., CLOUD DATA AUTHENTICATION CRYPTOGRAPHY AND DATA SHARING USING REVOCABLE-STORAGE IDENTITY-BASED ENCRYPTION.
8. Laxmi, K., 2019. Sky Driving Using Revocable-Storage Identity-Based Encryption.
9. Zhao, Y., Xie, X., Zhang, X. and Ding, Y., 2019. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage. Mathematical biosciences and engineering: MBE, 16(5), pp.4229-4
10. Lee, K., 2019. On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme. arXiv preprint arXiv:1904.01203.
11.Lian, H., Wang, G. and Wang, Q., 2018, October. Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method. In 2018 Third International 12.Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) (pp. 1-8). IEEE.
13. Srivastava, U., Singh, S.M., Sonal, S., Varma, N.B. and Jakkali, B., SECURING CLOUD SERVICES USING REVOCABLE IDENTITY BASED ENCRYPTION. More, M.P.R., A Framework for Secure Data Sharing in Cloud Computing using RS-IBE Mechanism.


Selvavinayagam G, Gajalakshmi S, Akshaya R, Dineshkumar S, Keerthana R, Rabin M
Department of Information Technology,
Rathinam Technical Campus,
Coimbatore, India

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top