SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 114-117
www.iosrjournals.org
DOI: 10.9790/0661-180203114117 www.iosrjournals.org 114 | Page
Improved Identity Based Encryption with Secured Revocation
Mechanism in Cloud Computing
S.Dhivya1
, P.Senthil2
,
PG Scholar1
, Assistant Professor2
, Department of Information Technology1,2
,
Kongunadu College of Engineering and Technology1,2
, Tamilnadu.
Abstract: Cloud data storing and retrieval is mostly important process in the cloud computing environment
because of which cloud service providers are increase. When users attempts to store their contents in the third
party service providers, the major challenge that might arise is the security. To ensure the security, data’s are
stored in the encrypted formats. Here the data access control would be more difficult problem where the data
access needs to be limited for the available users. In this work, identity based encryption is used to limit the data
access permission for the users by encrypting the data contents using the unique identity information. The identity
based encryption is done in the block level to control the data contents that are provided to the users. To ensure the
security from the malicious users, this work introduces the user revocation scheme. Revocation process is
outsourced to the key update server to reduce the burden of private key generator. The overall burden of revoked
users is eliminated by separating the key updation process from the data server. The key updation server is splitted
and distributed to the different components such updation key generation process to the key updation server and the
key updation process to the individual users. The experimental tests conducted by proved that the proposed
methodology provides better result than the existing approach in terms of improved security level.
I. Introduction
Cloud computing is a promising computing paradigm which recently has being drawn extensive attention
from a both academia and industry. By combining a set of existing and new techniques from it research areas such
as Service Oriented Architectures (SOA) and virtualizations, cloud computing is regarded as such a computing
paradigms in which resources in the computing infrastructures are provided as services over the Internet[1]. Key
distributions are done in a decentralized way. One limitation is that the cloud knows the access policy for each
record stored in the cloud.
Data security, as it exists in many other applications, is among these challenges that would raise great
concerns from user when they store sensitive information’s on cloud server. Cloud computing multitenancy and
virtualization futures posed unique securities and access control challenges due to sharing of physical resources
among potential trusted tenants, resulting in an increased risk of side channel attacks [2]. Clouds can be classified
as public, private or hybrid. Cloud computing realize on sharing of resources to achieve coherence and economies
of scales, similar to a utility likes the electricity grid over a network. Data access control in the cloud leads to a
security concern which provides a main research goal to the researchers and developer of cloud computing. The
main goal of this project is to provide a privacy and security concern for the cloud storage data owner when they are
outsourcing their confidential data [3].
Cloud infrastructures can roughly categorized as either private or public. In private clouds, the
infrastructure is managed and owned by the customer and located on-premise means that access to customer data is
under its control and is only granted to parties it trusts [4]. The addition of virtualized layers also means that
accountability might require the identification not only of the virtual server in which an events takes place,, but also
the physical server. Once cloud computing steps into our daily lives, any locally stored information, such as email,
word processing documents and spreadsheets, could be remotely stored in a cloud. Secure provenance is of
paramount importance to the flourish of cloud computing, yet it is still challenging today [5].
II. System Analysis
Existing System
It can be done by integrating the attributes with the encrypted plain text. The data will be encrypted under
the access control scheme came from the attribute authority by using the symmetric key encryption algorithm.
Cloud storage is an important service of cloud computing, which offers services for a data owners to host
their data in these cloud. This new paradigm of data hosting and data access service introduces a great challenge to
a data access control. Because the cloud server cannot been fully trusted by a data owners, they can no longer relay
on servers to do a access control. Cipher text Policy Attribute-based Encryption (CP-ABE) is regarded as one of the
most suitable technologies for data access control in the cloud storage systems, because it gives the data ownership
more direct control access policies. It can be done by a integrating the attributes with their encrypted plain text. The
Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing
DOI: 10.9790/0661-180203114117 www.iosrjournals.org 115 | Page
data will be encrypted under the access control schemes came from the attribute authorities by using the symmetric
key encryption algorithms.
Difficulties
In the existing works the symmetric encryptions is applied for the data encryption, where there may been
possibility of data collision. That is there may be possibility of retrieving the entire contents of the files in the
receiver side. The attribute attacker may act as an attacker, where there is a possibility of issuing a wrong secret key
to the users which will prevent them from the accessing the data contents.
III. Proposed System
In the proposed work, outsourcing computation is introduced into Identity Based Encryption (IBE)
revocation, and formalizes the security definition of outsourced revocable IBE for the first time to the best of our
knowledge. It propose a scheme to offload all the key generation related operations during key-issuing and key
update, leaving only a constant number of simple operations for Private Key Generator(PKG) and eligible users to
perform locally. In this scheme, it realizes revocation through updating the private keys of the unrevoked users. But
unlike traditional IBE which trivially concatenates time period with identity for key generation/update and requires
to re-issue the whole private key for unrevoked users, it propose a novel collusion-resistant key issuing technique: It
employ a hybrid private key for each user, in which a connector is involved to connect and bound two sub-
components, namely the identity component and the time component. At first, user is able to obtain the identity
component and a default time component (i.e., for current time period) from PKG as his/her private key in key-
issuing. Afterwards, in order to maintain decryptability, unrevoked users needs to periodically request on key
update for time component to a newly introduced entity named Key Update Cloud Service Provider (KU-CSP).
Machine Selection
CNC is computerized technology by controlling the relative movements between the tool and the work piece
geometrical shapes are machined. Control of these relative movements through coded letters numbers is known as
Numerical Control of machine tools.
Fig.1 System Architecture
IV. Cloud Setup
The cloud network environment consists of the roles of user, data owner and the cloud server. The data
owner is nothing but who stores and shares their health information. The data owner is responsible for encrypting
and sharing the access control permission with the users. The cloud server is the one who is responsible for storing
their contents into the network. The cloud server will store the contents received from the data owners and the
authentication of valid users will be performed by the cloud servers.
Encryption and Decryption Phase
In this module, encryption process of original contents to be stored in the cloud storage that is done by the
cloud data owners and the decryption process to be done by the cloud users are given.
To ensure the security of the cloud stored contents from them who are meant to be third party servers,
cryptographic based encryption is introduced. This will allow users to store the encrypted contents in the cloud
server instead of storing the plain texts directly. Thu the security for the cloud data owners is ensured.
Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing
DOI: 10.9790/0661-180203114117 www.iosrjournals.org 116 | Page
Fig.2 Computation overhead
Computation overhead is defined as the total processing complexity that is consumed for revoking the
users who are involved in the system. Computation overhead of the proposed research scenario should be less for
the improved system performance. The representation of the computation overhead which is obtained in the
proposed research is depicted in the following graphical representation.
S.No Revocation Ratio Computation Overhead
1 10 120
2 20 240
3 30 300
4 40 460
5 50 580
6 60 670
7 70 750
8 80 860
9 90 980
Table.1 Computation Overhead Measures
V. Time Complexity Comparison
Time complexity is defined as the total time consumed for processing the user submitted query and the
time taken revoke the users in the flexible manner. The time complexity is represented in the following graphical
representation.
In this figure time complexity is depicted. In the x axis different revocation ratio is represented. In the y
axis time complexity is represented. From this graph, it is proved that the time complexity of the proposed research
scenario is increasing in the linear manner.
Figure.6.2Time Complexity Comparison
Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing
DOI: 10.9790/0661-180203114117 www.iosrjournals.org 117 | Page
S.No Revocation Ratio Time Cost
1 10 0.8
2 20 1.85
3 30 2.7
4 40 3.6
5 50 3.6
6 60 4.5
7 70 5.2
8 80 5.95
9 90 5.95
Table.2 Time Cost Measures
VI. Results And Discussions
Cloud computing becomes most popular due to its flexibility of allowing multiple users to access the
shared data. The data access control mechanism can be limited by the multiple attribute authorities by defining their
individual attributes to control. In this work, identity based encryption with the consideration of the full
anonymization is done with the consideration of the identity details of the users. This is proposed to provide an
efficient access control over a third party providers and users with security concern. The malicious users and
malicious providers cannot access the data’s without knowing the privileged commitment message details. The
experimental results prove that our proposed mechanism provides an efficient result than the existing
methodologies.
In future malicious behaviour of the key updation server can be updated in terms of their malicious
behaviour. The different encryption standards that are based on the different malicious users can be prevented by
accessing the terminologies that denoted by the malicious key updation server. There is a revocation list to ensure
that the users are revoked or not. It is used to secure the data content from malicious users.
Data integrity and confidentiality mechanisms can be integrated with these schemes to ensure the
provisioning of the fresh copies of data contents to the other users. Data access control process can be decentralized
to reduce the computation overhead that might get increased in the centralized server.
References
[1]. Allison Lewko1, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters(2010), “Fully Secure Functional Encryption:
Attribute-Based Encryption and (Hierarchical) Inner Product Encryption”, Advances in cryptology, Lecture Notes in Computer Science,
Volume 6110, pp 62-91.
[2]. Brent Waters(2011), “Ciphertext-Policy Attribute-Based Encryption:An Expressive, E_cient, and Provably Secure Realization”, Public
key cryptography, Lecture Notes in Computer Science Volume 6571, pp 53-70.
[3]. Deepak Mishra, Manish Shrivastava(2012), “Optimal service pricing for cloud based services”, International Journal of Soft Computing
and Engineering (IJSCE), ISSN: 2231-2307, Volume-2.
[4]. HUANG Qinlong, MA Zhaofeng, YANG Yixian, NIU Xinxin, FU Jingyi(2014), “Attribute Based DRM Scheme with Dynamic
UsageControl in Cloud Computing”, China Communications, V olume:11 , Issue: 4, PP: 50 – 63.
[5]. Kai Hwang, Deyi Li(2010), “Trusted Cloud Computing with Secure Resources and Data Coloring”, Internet Computing,Volume:14
Issue: 5, PP:14 – 22.
[6]. Kyle Chard, and Kris Bubendorfer (2013) “High Performance Resource AllocationStrategies for Computational Economies”, IEEE
Transactions On Parallel And Distributed Systems, Vol. 24, No. 1.
[7]. Ming Li, Shucheng Yu, Yao Zheng,Kui Ren, and Wenjing Lou (2013), “Scalable and Secure Sharing of PersonalHealth Records in
Cloud Computing UsingAttribute-Based Encryption”, IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 1.
[8]. Sheng Di and Cho-Li Wang(2013), “Dynamic Optimization of Multi-AttributeResource Allocation in Self-Organizing Clouds”, Parallel
and Distributed Systems, IEEE Transactions on Volume: 24 , Issue: 3 , Page(s): 464 – 478.
[9]. Yao Wang, Julita Vassileva, “Trust and Reputation Model in Peer-to-Peer Networks”, Proceedings of the 3rd International Conference
on Peer-to-Peer Computing, Page 150, ISBN:0-7695-2023-5.
[10]. Zhiguo Wan, Jun’e Liu, and Robert H. Deng(2012), “HASBE: A Hierarchical Attribute-Based Solutionfor Flexible and Scalable Access
Controlin Cloud Computing”, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2.

Contenu connexe

Tendances

Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 

Tendances (18)

Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
C017421624
C017421624C017421624
C017421624
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
J018145862
J018145862J018145862
J018145862
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
C04932125
C04932125C04932125
C04932125
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 

En vedette

Dispositivos electronicos
Dispositivos electronicosDispositivos electronicos
Dispositivos electronicosyeseniaocampo
 
Das Rostocker Armeninstitut von 1803 – Anspruch und Wirklichkeit
Das Rostocker Armeninstitut von 1803 – Anspruch und WirklichkeitDas Rostocker Armeninstitut von 1803 – Anspruch und Wirklichkeit
Das Rostocker Armeninstitut von 1803 – Anspruch und WirklichkeitDr. Jan Straßenburg
 
Expo cubo, cilindro
Expo cubo, cilindroExpo cubo, cilindro
Expo cubo, cilindroasenetcbb
 
Medieneigenproduktionen
MedieneigenproduktionenMedieneigenproduktionen
Medieneigenproduktionenmiss_jones
 
Choosing Healthcare Plans - Business Deck
Choosing Healthcare Plans - Business DeckChoosing Healthcare Plans - Business Deck
Choosing Healthcare Plans - Business DeckNitish Bhardwaj
 
Proyecto final de power point
Proyecto final de power pointProyecto final de power point
Proyecto final de power pointrealmadrido23a7
 
Comex report-daily by epic research 22.03.13
Comex report-daily by epic research 22.03.13Comex report-daily by epic research 22.03.13
Comex report-daily by epic research 22.03.13Epic Daily Report
 
MAPA CONCEPTUAL GERENCIA DE PROYECTOS
MAPA CONCEPTUAL GERENCIA DE PROYECTOSMAPA CONCEPTUAL GERENCIA DE PROYECTOS
MAPA CONCEPTUAL GERENCIA DE PROYECTOSWils Mat
 
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...Klemens Skibicki
 
Food Web Book
Food Web BookFood Web Book
Food Web Bookromeo4752
 
Liderazgo y exito jeferson mahecha
Liderazgo y exito jeferson mahechaLiderazgo y exito jeferson mahecha
Liderazgo y exito jeferson mahechajsmf
 
Prog menton avril juin 2012 br
Prog menton avril juin 2012 brProg menton avril juin 2012 br
Prog menton avril juin 2012 brJessica Trubert
 

En vedette (20)

Mapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectosMapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectos
 
Dispositivos electronicos
Dispositivos electronicosDispositivos electronicos
Dispositivos electronicos
 
Das Rostocker Armeninstitut von 1803 – Anspruch und Wirklichkeit
Das Rostocker Armeninstitut von 1803 – Anspruch und WirklichkeitDas Rostocker Armeninstitut von 1803 – Anspruch und Wirklichkeit
Das Rostocker Armeninstitut von 1803 – Anspruch und Wirklichkeit
 
Práctica 11
Práctica 11Práctica 11
Práctica 11
 
Expo cubo, cilindro
Expo cubo, cilindroExpo cubo, cilindro
Expo cubo, cilindro
 
Medieneigenproduktionen
MedieneigenproduktionenMedieneigenproduktionen
Medieneigenproduktionen
 
Ejemplo Canvas
Ejemplo CanvasEjemplo Canvas
Ejemplo Canvas
 
Anuktatop dp 2016_bq
Anuktatop dp 2016_bqAnuktatop dp 2016_bq
Anuktatop dp 2016_bq
 
Choosing Healthcare Plans - Business Deck
Choosing Healthcare Plans - Business DeckChoosing Healthcare Plans - Business Deck
Choosing Healthcare Plans - Business Deck
 
Proyecto final de power point
Proyecto final de power pointProyecto final de power point
Proyecto final de power point
 
Snsdfacts
SnsdfactsSnsdfacts
Snsdfacts
 
Comex report-daily by epic research 22.03.13
Comex report-daily by epic research 22.03.13Comex report-daily by epic research 22.03.13
Comex report-daily by epic research 22.03.13
 
Empresarismo.
Empresarismo.Empresarismo.
Empresarismo.
 
MAPA CONCEPTUAL GERENCIA DE PROYECTOS
MAPA CONCEPTUAL GERENCIA DE PROYECTOSMAPA CONCEPTUAL GERENCIA DE PROYECTOS
MAPA CONCEPTUAL GERENCIA DE PROYECTOS
 
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...
Prof. Skibicki Brain Injection Soziale Netzwerke als Marketinginstrument_Memi...
 
Food Web Book
Food Web BookFood Web Book
Food Web Book
 
Pres3
Pres3Pres3
Pres3
 
Tic project
Tic projectTic project
Tic project
 
Liderazgo y exito jeferson mahecha
Liderazgo y exito jeferson mahechaLiderazgo y exito jeferson mahecha
Liderazgo y exito jeferson mahecha
 
Prog menton avril juin 2012 br
Prog menton avril juin 2012 brProg menton avril juin 2012 br
Prog menton avril juin 2012 br
 

Similaire à R180203114117

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...IJSRED
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 

Similaire à R180203114117 (20)

Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

R180203114117

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 114-117 www.iosrjournals.org DOI: 10.9790/0661-180203114117 www.iosrjournals.org 114 | Page Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing S.Dhivya1 , P.Senthil2 , PG Scholar1 , Assistant Professor2 , Department of Information Technology1,2 , Kongunadu College of Engineering and Technology1,2 , Tamilnadu. Abstract: Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party service providers, the major challenge that might arise is the security. To ensure the security, data’s are stored in the encrypted formats. Here the data access control would be more difficult problem where the data access needs to be limited for the available users. In this work, identity based encryption is used to limit the data access permission for the users by encrypting the data contents using the unique identity information. The identity based encryption is done in the block level to control the data contents that are provided to the users. To ensure the security from the malicious users, this work introduces the user revocation scheme. Revocation process is outsourced to the key update server to reduce the burden of private key generator. The overall burden of revoked users is eliminated by separating the key updation process from the data server. The key updation server is splitted and distributed to the different components such updation key generation process to the key updation server and the key updation process to the individual users. The experimental tests conducted by proved that the proposed methodology provides better result than the existing approach in terms of improved security level. I. Introduction Cloud computing is a promising computing paradigm which recently has being drawn extensive attention from a both academia and industry. By combining a set of existing and new techniques from it research areas such as Service Oriented Architectures (SOA) and virtualizations, cloud computing is regarded as such a computing paradigms in which resources in the computing infrastructures are provided as services over the Internet[1]. Key distributions are done in a decentralized way. One limitation is that the cloud knows the access policy for each record stored in the cloud. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from user when they store sensitive information’s on cloud server. Cloud computing multitenancy and virtualization futures posed unique securities and access control challenges due to sharing of physical resources among potential trusted tenants, resulting in an increased risk of side channel attacks [2]. Clouds can be classified as public, private or hybrid. Cloud computing realize on sharing of resources to achieve coherence and economies of scales, similar to a utility likes the electricity grid over a network. Data access control in the cloud leads to a security concern which provides a main research goal to the researchers and developer of cloud computing. The main goal of this project is to provide a privacy and security concern for the cloud storage data owner when they are outsourcing their confidential data [3]. Cloud infrastructures can roughly categorized as either private or public. In private clouds, the infrastructure is managed and owned by the customer and located on-premise means that access to customer data is under its control and is only granted to parties it trusts [4]. The addition of virtualized layers also means that accountability might require the identification not only of the virtual server in which an events takes place,, but also the physical server. Once cloud computing steps into our daily lives, any locally stored information, such as email, word processing documents and spreadsheets, could be remotely stored in a cloud. Secure provenance is of paramount importance to the flourish of cloud computing, yet it is still challenging today [5]. II. System Analysis Existing System It can be done by integrating the attributes with the encrypted plain text. The data will be encrypted under the access control scheme came from the attribute authority by using the symmetric key encryption algorithm. Cloud storage is an important service of cloud computing, which offers services for a data owners to host their data in these cloud. This new paradigm of data hosting and data access service introduces a great challenge to a data access control. Because the cloud server cannot been fully trusted by a data owners, they can no longer relay on servers to do a access control. Cipher text Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in the cloud storage systems, because it gives the data ownership more direct control access policies. It can be done by a integrating the attributes with their encrypted plain text. The
  • 2. Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing DOI: 10.9790/0661-180203114117 www.iosrjournals.org 115 | Page data will be encrypted under the access control schemes came from the attribute authorities by using the symmetric key encryption algorithms. Difficulties In the existing works the symmetric encryptions is applied for the data encryption, where there may been possibility of data collision. That is there may be possibility of retrieving the entire contents of the files in the receiver side. The attribute attacker may act as an attacker, where there is a possibility of issuing a wrong secret key to the users which will prevent them from the accessing the data contents. III. Proposed System In the proposed work, outsourcing computation is introduced into Identity Based Encryption (IBE) revocation, and formalizes the security definition of outsourced revocable IBE for the first time to the best of our knowledge. It propose a scheme to offload all the key generation related operations during key-issuing and key update, leaving only a constant number of simple operations for Private Key Generator(PKG) and eligible users to perform locally. In this scheme, it realizes revocation through updating the private keys of the unrevoked users. But unlike traditional IBE which trivially concatenates time period with identity for key generation/update and requires to re-issue the whole private key for unrevoked users, it propose a novel collusion-resistant key issuing technique: It employ a hybrid private key for each user, in which a connector is involved to connect and bound two sub- components, namely the identity component and the time component. At first, user is able to obtain the identity component and a default time component (i.e., for current time period) from PKG as his/her private key in key- issuing. Afterwards, in order to maintain decryptability, unrevoked users needs to periodically request on key update for time component to a newly introduced entity named Key Update Cloud Service Provider (KU-CSP). Machine Selection CNC is computerized technology by controlling the relative movements between the tool and the work piece geometrical shapes are machined. Control of these relative movements through coded letters numbers is known as Numerical Control of machine tools. Fig.1 System Architecture IV. Cloud Setup The cloud network environment consists of the roles of user, data owner and the cloud server. The data owner is nothing but who stores and shares their health information. The data owner is responsible for encrypting and sharing the access control permission with the users. The cloud server is the one who is responsible for storing their contents into the network. The cloud server will store the contents received from the data owners and the authentication of valid users will be performed by the cloud servers. Encryption and Decryption Phase In this module, encryption process of original contents to be stored in the cloud storage that is done by the cloud data owners and the decryption process to be done by the cloud users are given. To ensure the security of the cloud stored contents from them who are meant to be third party servers, cryptographic based encryption is introduced. This will allow users to store the encrypted contents in the cloud server instead of storing the plain texts directly. Thu the security for the cloud data owners is ensured.
  • 3. Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing DOI: 10.9790/0661-180203114117 www.iosrjournals.org 116 | Page Fig.2 Computation overhead Computation overhead is defined as the total processing complexity that is consumed for revoking the users who are involved in the system. Computation overhead of the proposed research scenario should be less for the improved system performance. The representation of the computation overhead which is obtained in the proposed research is depicted in the following graphical representation. S.No Revocation Ratio Computation Overhead 1 10 120 2 20 240 3 30 300 4 40 460 5 50 580 6 60 670 7 70 750 8 80 860 9 90 980 Table.1 Computation Overhead Measures V. Time Complexity Comparison Time complexity is defined as the total time consumed for processing the user submitted query and the time taken revoke the users in the flexible manner. The time complexity is represented in the following graphical representation. In this figure time complexity is depicted. In the x axis different revocation ratio is represented. In the y axis time complexity is represented. From this graph, it is proved that the time complexity of the proposed research scenario is increasing in the linear manner. Figure.6.2Time Complexity Comparison
  • 4. Improved Identity Based Encryption With Secured Revocation Mechanism In Loud Computing DOI: 10.9790/0661-180203114117 www.iosrjournals.org 117 | Page S.No Revocation Ratio Time Cost 1 10 0.8 2 20 1.85 3 30 2.7 4 40 3.6 5 50 3.6 6 60 4.5 7 70 5.2 8 80 5.95 9 90 5.95 Table.2 Time Cost Measures VI. Results And Discussions Cloud computing becomes most popular due to its flexibility of allowing multiple users to access the shared data. The data access control mechanism can be limited by the multiple attribute authorities by defining their individual attributes to control. In this work, identity based encryption with the consideration of the full anonymization is done with the consideration of the identity details of the users. This is proposed to provide an efficient access control over a third party providers and users with security concern. The malicious users and malicious providers cannot access the data’s without knowing the privileged commitment message details. The experimental results prove that our proposed mechanism provides an efficient result than the existing methodologies. In future malicious behaviour of the key updation server can be updated in terms of their malicious behaviour. The different encryption standards that are based on the different malicious users can be prevented by accessing the terminologies that denoted by the malicious key updation server. There is a revocation list to ensure that the users are revoked or not. It is used to secure the data content from malicious users. Data integrity and confidentiality mechanisms can be integrated with these schemes to ensure the provisioning of the fresh copies of data contents to the other users. Data access control process can be decentralized to reduce the computation overhead that might get increased in the centralized server. References [1]. Allison Lewko1, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters(2010), “Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption”, Advances in cryptology, Lecture Notes in Computer Science, Volume 6110, pp 62-91. [2]. Brent Waters(2011), “Ciphertext-Policy Attribute-Based Encryption:An Expressive, E_cient, and Provably Secure Realization”, Public key cryptography, Lecture Notes in Computer Science Volume 6571, pp 53-70. [3]. Deepak Mishra, Manish Shrivastava(2012), “Optimal service pricing for cloud based services”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2. [4]. HUANG Qinlong, MA Zhaofeng, YANG Yixian, NIU Xinxin, FU Jingyi(2014), “Attribute Based DRM Scheme with Dynamic UsageControl in Cloud Computing”, China Communications, V olume:11 , Issue: 4, PP: 50 – 63. [5]. Kai Hwang, Deyi Li(2010), “Trusted Cloud Computing with Secure Resources and Data Coloring”, Internet Computing,Volume:14 Issue: 5, PP:14 – 22. [6]. Kyle Chard, and Kris Bubendorfer (2013) “High Performance Resource AllocationStrategies for Computational Economies”, IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 1. [7]. Ming Li, Shucheng Yu, Yao Zheng,Kui Ren, and Wenjing Lou (2013), “Scalable and Secure Sharing of PersonalHealth Records in Cloud Computing UsingAttribute-Based Encryption”, IEEE Transactions On Parallel And Distributed Systems, Vol. 24, No. 1. [8]. Sheng Di and Cho-Li Wang(2013), “Dynamic Optimization of Multi-AttributeResource Allocation in Self-Organizing Clouds”, Parallel and Distributed Systems, IEEE Transactions on Volume: 24 , Issue: 3 , Page(s): 464 – 478. [9]. Yao Wang, Julita Vassileva, “Trust and Reputation Model in Peer-to-Peer Networks”, Proceedings of the 3rd International Conference on Peer-to-Peer Computing, Page 150, ISBN:0-7695-2023-5. [10]. Zhiguo Wan, Jun’e Liu, and Robert H. Deng(2012), “HASBE: A Hierarchical Attribute-Based Solutionfor Flexible and Scalable Access Controlin Cloud Computing”, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2.