Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Revocable ID-Based Proxy Re-Encryption and Data Uploading With Remote Data Integrity Checking

Author : Usharani J 1 Dr. Usha Sakthivel 2

Date of Publication :24th May 2017

Abstract: Many organizations have large amounts of data so, wants to store and process their data by using the remote cloud computing system. In public cloud, the clients store their massive data in the remote public cloud servers. Since the stored data is outside of the control of the clients, it entails the security risks in terms of confidentiality, integrity and availability of data and service. Remote data integrity checking is a primitive which can be used to convince the cloud clients that their data are kept intact. In some special cases, the data owner may be restricted to access the public cloud server, the data owner will delegate the task of data processing and uploading to the third party, for example the proxy. However, the major problem of cloud data storage is security. Therefore, cloud data storage need some mechanisms that should be able to specify storage correctness and integrity of data stored on a cloud. On the other side, the remote data integrity checking protocol must be efficient in order to make it suitable for capacity-limited end devices. Thus, based on revocable identity-based public cryptography and proxy public key cryptography, we will study RID-PREUIC protocol. Revocable ID-Based Proxy Re-Encryption and Data Uploading with Remote Data Integrity Checking is an attractive alternative for public key cryptography. RID-PREUIC eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. An RID-PREUIC consists of Client, Proxy, PCS (Public Cloud Server), End-user and a trusted third party (i.e. private key generator, PKG). The PKG is responsible to generate each user’s private key by using the associated ID information (e.g. e-mail address, name or social security number). Therefore, no certificate and PKI are required in the associated cryptographic mechanisms under RID-PREUIC

Reference :

Will Updated soon

Recent Article