International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume4,May 2017,

Topic : Revocable ID-Based Proxy Re-Encryption and Data Uploading With Remote Data Integrity Checking

Authors:Usharani J || Dr. Usha Sakthivel

Abstract:Many organizations have large amounts of data so, wants to store and process their data by using the remote cloud computing system. In public cloud, the clients store their massive data in the remote public cloud servers. Since the stored data is outside of the control of the clients, it entails the security risks in terms of confidentiality, integrity and availability of data and service. Remote data integrity checking is a primitive which can be used to convince the cloud clients that their data are kept intact. In some special cases, the data owner may be restricted to access the public cloud server, the data owner will delegate the task of data processing and uploading to the third party, for example the proxy. However, the major problem of cloud data storage is security. Therefore, cloud data storage need some mechanisms that should be able to specify storage correctness and integrity of data stored on a cloud. On the other side, the remote data integrity checking protocol must be efficient in order to make it suitable for capacity-limited end devices. Thus, based on revocable identity-based public cryptography and proxy public key cryptography, we will study RID-PREUIC protocol. Revocable ID-Based Proxy Re-Encryption and Data Uploading with Remote Data Integrity Checking is an attractive alternative for public key cryptography. RID-PREUIC eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. An RID-PREUIC consists of Client, Proxy, PCS (Public Cloud Server), End-user and a trusted third party (i.e. private key generator, PKG). The PKG is responsible to generate each user’s private key by using the associated ID information (e.g. e-mail address, name or social security number). Therefore, no certificate and PKI are required in the associated cryptographic mechanisms under RID-PREUIC.

Keywords: Cloud computing, identity-based proxy re-encryption, Revocation, Key authority, remote data integrity checking

Download Paper

DOI: 01.1617/vol4/iss5/pid85291

Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2017.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2017.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2017.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2017.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2017.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2017.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2017.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2017.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2017.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2017.


Call for Papers


Editor Image

Dr. Allon Guez
Professor, Drexel University,

View more



Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact :