SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING WITH
OUTSOURCED REVOCATION
Manvitha Varsha1
, T. Sree Lakshmi2
1
M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh.
2
Associate Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh.
ABSTRACT:
Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based
Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the
overhead computation at private key generator (PKG).In this paper, going for survey on distinct method for
handling the basic issue of Identity renouncement. Identity Based Encryption (IBE) simplifies public key
management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator
(PKG). However,one of the main drawback of IBE is overheaded computation at PKG during user revocation.
The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key-
issuing and key-update process leaving only a number of simple operations for PKG and users to perform
locally.For this,we generate a hybrid private key for each user, in which an AND gate is used to connect and
bound the identity component and time component.But KU-CSP is untrusted. So, we propose a Pseudonym
Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We also
discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable
IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-
issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic
operations for PKG and clients to perform locally. Moreover, we propose another development which is provable
secure under the as of late formulized Refereed handing over of Computation model. We also discussed our
proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in
the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and
key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations
for PKG and clients to perform locally. Moreover, we propose another development which is provable secure
under the as of late formulized Refereed handing over of Computation model.
Index Terms-
1. INTRODUCTION
Identity based encryption system allow any user to
generate a public key from a known identity value such
as an ASCII string. There is trusted third party, called
the Private Key Generator (PKG), who generates the
corresponding private keys. For encryption and
decryption operations, PKG first publishes a master
public key, and then generate the
corresponding master private key (referred as master
key). Using this master public key, any user can
generate a public key corresponding to the identity by
combining the master public key with the identity
value. To get a corresponding private key, authorized
user can use identity ID contacts PKG, which uses the
master private key to generate private key for identity
ID. As a result, user can encrypt messages with no prior
distribution of keys between participants. This is very
useful in cases where predistribution of keys is
inconvenient because of technical restraints. However,
for decryption of message, the authorized user must
obtain an appropriate private key from PKG. In this
approach the problem is that PKG must be highly
trusted, as it has ability to generate any users private key
and decryption of message without authorization.
Because any user’s private key can be generated using
third party’s secret, this system has inherent key
assurance. A different systems have been proposed
which remove this including certificate-based
encryption and secure key issuing cryptography. In PKI
setting, revocation is done by appending validity
periods to certificates or using combinations of
techniques. But, this require management of certificates
which is precisely the burden that IBE strives to
alleviate. Boneh and Franklin suggested that their
private keys can renewed by user periodically and
senders use receivers identity with current time
period.But this mechanism would results in an
overhead at PKG. In another word, all the users even
though their keys have been revoked or not, have to
contact with private key generator( PKG) periodically
to prove their identities and update new private keys. It
is needed that PKG must be online and the secure
channel has to be maintained for all the transactions,
which will become a bottleneck for IBE system as the
number of users grows. Many businesses large and
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201615
small use cloud computing today either directly or
indirectly instead of traditional onsite alternatives.
There are a number of reasons like Reduction of
costs,Universal access and many more because of
which cloud computing is so widely used among
businesses today. Thus it require a new working
paradigm for introducing cloud services into IBE
revocation to fix the issue of efficiency and storage
overhead. A naive approach is hand over the private key
generators (PKG) master key to the Cloud Service
Providers (CSPs). The CSPs then simply update all
private keys by using the traditional key update
technique and transfer the private keys to unrevoked
users. However, this approach is based on an unrealistic
assumption that CSPs are fully trusted and are allowed
to access the master key for IBE system. But, in practice
the public clouds are likely outside of the same trusted
domain of users and are curious about users individual
privacy. For this reason, a challenge is how to design a
secure revocable IBE scheme so that we can reduce the
overhead computation at PKG with an untrusted CSP is
raised.
II. RELATED WORK
A Identity-Based Encryption (IBE) is an interesting
alternative to public key encryption, which simplify
key management in a certificate-based Public Key
Infrastructure (PKI) with use of human-intelligible
identities (e.g., unique name, IP address ,email
address,, etc) as a public keys. D. Boneh and M.
Franklin propose a fully functional identity-based
encryption scheme (IBE). The scheme has chosen
ciphertext security in the random oracle model
assuming an elliptic curve variant of the
computational Diffie-Hellman problem. System is
based on the Weil pairing and give precise definitions
for secure identity based encryption schemes and give
several applications for such systems[1]. A. Sahai and
B. Waters introduce a new type of Identity-Based
Encryption (IBE) scheme that we call Fuzzy Identity-
Based Encryption. In Fuzzy IBE an identity Is viewed
as set of descriptive attributes. A Fuzzy IBE scheme
allows for a private key for an identity, ID, to decrypt
a cipher text encrypted with an identity, ID’ , if and
only if the identities ID and ID’,are close to each other
as measured by the set overlap distance metric[2]. The
availability of fast and reliable Digital Identities is an
essential ingredient for the successful implementation
of the public-key infrastructure of the Internet. All
digital identity schemes must include a method for
revoking someone’s digital identity in the case that
this identity is stolen (or canceled) before its
expiration date (similar to the cancelation of a credit-
cards in the case that they are stolen). W. Aiello, S.
Lodha, and R. Ostrovsky proposed an elegant method
of identity revocation which requires very little
communication between users and verifiers in the
system They reduced the overall CA to Directory
communication, while still maintaining the same tiny
user to vendor communication[3]..
III.PROPOSED SYSTEM
The proposed system is Pseudonym Generation
Scheme with Combining the Identity based encryption
and
Attribute-based Encryption with Outsourced
Revocation in Cloud Computing. we use multiple KU-
CSP for key updation. For data security, use an efficient
encryption algorithm. For integrity checking, generate
meta data before upload the data in cloud. Using the
meta data the integrity of the file is verified. In
proposed work, we design a method in which each user
takes a different pseudonym when accessing cloud
services. There is almost no relationship between a user
identity and a corresponding pseudonym is provided,
and no relationship is provided between the
pseudonyms for a single. Pseudonym use will not affect
users attestation also reduces the amount of input data
representing private
user information thus making it almost impossible for
attackers to attack on users. In cloud data is stored
remotely, user is not aware of any security threat. Data
modification can done by the untrusted server
,unauthorized user or by some malicious activity. So
user needs to be ensured that their data are intact. For
this it is important to check integrity of data. for this
proposed system generate meta data and using this meta
data we examine the accuracy of data.
Proposed Algorithms :
Pseudonym Generation algorithm
1.User Identity ID is given as intial input.
2.check wether pseudonym is already generated or not.
3.If yes then give message pseudonym is already
generated.
4.If not chose type of pseudonym
Alpha/Numeric/Alphanumeric.
5.Use random function to generate random number.
6.Generate pseudonym using random number generated
in step 5.
7.Return pseudonym.
Key Generation Algorithm
1.select randomly two large prime number p,q
2.Compute n=p*q. Where n is modulus used to generate
public key and private key.
3.Compute the function as Ψ(n) = (p*1)(q*1).
4.Select any random number e between 1 and (n) the
function value previously calculated in step
3 such that the number is co-prime to '(n) and is not
divisor of Ψ (n).
5.Calculate d,which represent modular multiplicative
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201616
inverse of e mod Ψ (n).
i.e d should satisfy equation e*d mod Ψ (n) =1.
6.private key is represented by d calculated in step 5.
V.RESULTS
In this section we present the Module description, how
it works, practical results and environment. Pseudonym
Generation : we generate pseudonym for each user. It
take users identity and provide
pseudonym.Pseudonyms are usually taken or adopted to
hide an individual ones real identity, for example
writers’ pen names, or terrorists, and computer hackers
fake names. Actors, musicians, and other performers
sometimes uses stage names, for example, to hide their
ethnic backgrounds. Here we use pseudonym for hide
users real identity. Because KU-CSP is untrusted. So
adversaries can use the data without permission based
on users identity. So we generate pseudonym.
Key Generation : For each users private key request on
identity ID, PKG firstly checks whether the request
identity ID exists in revocation list RL, if so the key
generation is aborted. then it generates Private Key (PK)
and Outsourcig Key (OK).finally, it sends Private Key
to user and Pseudonym with Outsourcing key to KU-
CSP respectively.
Encryption : user wants to upload any file or message to
KUCSP. But KU-CSP is untrusted. So encryption is
compulsory.for security we use attribute based
encryption with identity based encryption scheme.Here
a user can encrypt a message M under Pseudonym P
with attributes and time period Ti. This provides the
ciphertext (CT). Then user can upload this ciphertext to
KU-CSP.
Decryption : user wants to download any file or
message from KU-CSP.user uses his private key send
by PKG and decrypt the message. Here the ciphertext
CT is encrypted under P with attributes and Ti, and the
user has a private key PK, this provides original
message M.
Revocation : If the private keys of some users get
compromised, PKG must provide a mean to revoke
such users from system.If users with identities in the set
that are to be revoked at time period Ti, PKG updates
the revocation list as RL as well as the time list TL
through linking the newly created time period Ti+1 onto
original list TL. Finally send a copy for the updated
revocation list RL as well as the new time period Ti+1
to KU-CSP.
Key Updation : Upon receiving a key-update request on
pseudonym, firstly KU-CSP checks whether ID exists in
the revocation list RL, if so KU-CSP returns null and
key-update is aborted. Otherwise it returns Updated Key
(TK) and keyupdate is KU-CSP fetches the
corresponding entry Id with outsourcing key in the user
list UL. In this section we provide the Results on basis of
Construction of Proposed system. We evaluate Time
required to respond by single CSP compared to time
required by multiple CSP.
VI.CONCLUSION AND FUTURE
Focusing on issue of identity revocation, we have
introduced outsourcing computation into IBE and
proposed a revocable scheme in which the revocation
operations are delegated to CSP. User needs not to
contact with PKG during key-update, in other words,
PKG is allowed to be offline after sending the
revocation list to KU-CSP. It do not require secure
channel or user authentication during key-update
between user and KU-CSP. Furthermore as KUCSP
is untrusted we use pseudonym for each user so that
adversary can not get real identity of user.we
combine the Identitybased and Attribute-based
Encryption which will provide more security to
user.For integrity checking, generate meta data
before upload the data in cloud. Using this meta data
the integrity of the file is verified
REFERENCES
[1] W Aiello, S Lodha, & R Ostrovsky. (1998). Fast
digital identity revocation. Advances in
Cryptology – CRYPTO’98. Springer.
[2] V Goyal. (2007). Certificate revocation using fine
grained certificate space partitioning. Financial
Cryptography and Data Security (LNCS). Berlin:
Springer. Vol. 4886, pp. 247–259.
[3] F Elwailly, C Gentry, & Z Ramzan. (2004).
Quasimodo: Efficient certificate validation and
revocation. Public Key Cryptography (LNCS). Berlin:
Springer. Vol. 2947, pp. 375–388.
[4] D Boneh, & M Franklin. (2001). Identity-based
encryption from the weil pairing. Advances in
Cryptology – CRYPTO 2001 (LNCS). Berlin:
Springer. Vol. 2139, pp. 213–229.
[5] A Boldyreva, V Goyal, & V Kumar. (2008).
Identity-based encryption with efficient revocation.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201617
In: Proceedings of the 15th ACM Conf. on Comp. and
Comm. Security. NewYork: ACM. pp.
417–426.
[6] A Sahai, & B Waters. (2005). Fuzzy identity-based
encryption. Advances in Cryptology
EUROCRYPT 2005 (LNCS). Berlin: Springer. Vol.
3494, pp. 557–557.
[7] R Canetti, B Riva, & GN Rothblum. (2011). Two 1-
round protocols for delegation of
computation. Cryptology ePrint Archive, Report
2011/518.
[8] U Feige, & J Kilian. (1997). Making games short.
Proceedings of the 29th annual ACM Symp. on
Theory of Computing. New York: ACM. pp. 506–516.
[9] S Hohenberger, & A Lysyanskaya. (2005). How to
securely outsource cryptographic
computations. Proceedings of the 2nd Inter. Conf. on
Theory of Cryptography. Berlin: Springer-
Verlag. pp. 264–282.
[10] R Canetti, B Riva, & G Rothblum. (2012). Two
protocols for delegation of computation.
Information Theoretic Security (LNCS). Berlin:
Springer. Vol. 7412, pp. 37–61.
[11] X Chen, J Li, J Ma, Q Tang, & W Lou. (2012).
New and secure outsourcing algorithms of
modular exponentiations. 17th European Symp. on
Research in Computer Security, 2012.
[12] MJ Atallah, & KB Frikken. (). Securely
outsourcing linear algebra computations. Proceedings
of the 5th ACM Symp. on Information, Computer and
Communications Security. New York:
ACM. pp. 48–59.
[13] A Shamir. (1985). Identity-based cryptosystems
and signature schemes. Advances in
Cryptology – CRYPTO (LNCS). Berlin: Springer. Vol.
196, pp. 47–53.
[14] C Cocks. (2001). An identity based encryption
scheme based on quadratic residues.
Cryptography and Coding (LNCS). Berlin: Springer.
Vol. 2260, pp. 360–363.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201618

Contenu connexe

Tendances

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingShakas Technologies
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Finalyearprojects Toall
 
A Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingA Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingIRJET Journal
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibcLokesh Gopu
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...IJCSIS Research Publications
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queriesijtsrd
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingPvrtechnologies Nellore
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 

Tendances (17)

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
A Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingA Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud Computing
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibc
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 

En vedette

iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...Iaetsd Iaetsd
 
Iaetsd fuzzy logic control of statcom for voltage regulation
Iaetsd fuzzy logic control of statcom for voltage regulationIaetsd fuzzy logic control of statcom for voltage regulation
Iaetsd fuzzy logic control of statcom for voltage regulationIaetsd Iaetsd
 
Iaetsd a modified image fusion approach using guided filter
Iaetsd a modified image fusion approach using guided filterIaetsd a modified image fusion approach using guided filter
Iaetsd a modified image fusion approach using guided filterIaetsd Iaetsd
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender systemIaetsd Iaetsd
 
iaetsd Unmanned aerial vehicle in the field of agriculture
iaetsd Unmanned aerial vehicle in the field of agricultureiaetsd Unmanned aerial vehicle in the field of agriculture
iaetsd Unmanned aerial vehicle in the field of agricultureIaetsd Iaetsd
 
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iaetsd Iaetsd
 
Iaetsd catalytic fuel converters [cfc]
Iaetsd catalytic fuel converters [cfc]Iaetsd catalytic fuel converters [cfc]
Iaetsd catalytic fuel converters [cfc]Iaetsd Iaetsd
 
Iaetsd designing of cmos image sensor test-chip and its characterization
Iaetsd designing of cmos image sensor test-chip and its characterizationIaetsd designing of cmos image sensor test-chip and its characterization
Iaetsd designing of cmos image sensor test-chip and its characterizationIaetsd Iaetsd
 
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...Iaetsd Iaetsd
 
Iaetsd study of cracks in structural concrete
Iaetsd study of cracks in structural concreteIaetsd study of cracks in structural concrete
Iaetsd study of cracks in structural concreteIaetsd Iaetsd
 
Iirdem design and implementation of finger writing in air by using open cv (c...
Iirdem design and implementation of finger writing in air by using open cv (c...Iirdem design and implementation of finger writing in air by using open cv (c...
Iirdem design and implementation of finger writing in air by using open cv (c...Iaetsd Iaetsd
 
Iaetsd march c algorithm for embedded memories in fpga
Iaetsd march c algorithm for embedded memories in fpgaIaetsd march c algorithm for embedded memories in fpga
Iaetsd march c algorithm for embedded memories in fpgaIaetsd Iaetsd
 
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd Iaetsd
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd Iaetsd
 
Iaetsd glitch free nand based digitally controlled delay lines using low power
Iaetsd glitch free nand based digitally controlled delay lines using low powerIaetsd glitch free nand based digitally controlled delay lines using low power
Iaetsd glitch free nand based digitally controlled delay lines using low powerIaetsd Iaetsd
 
Iaetsd solar based energy efficient system
Iaetsd solar based energy efficient systemIaetsd solar based energy efficient system
Iaetsd solar based energy efficient systemIaetsd Iaetsd
 
Iaetsd mapreduce streaming over cassandra datasets
Iaetsd mapreduce streaming over cassandra datasetsIaetsd mapreduce streaming over cassandra datasets
Iaetsd mapreduce streaming over cassandra datasetsIaetsd Iaetsd
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd Iaetsd
 

En vedette (18)

iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
 
Iaetsd fuzzy logic control of statcom for voltage regulation
Iaetsd fuzzy logic control of statcom for voltage regulationIaetsd fuzzy logic control of statcom for voltage regulation
Iaetsd fuzzy logic control of statcom for voltage regulation
 
Iaetsd a modified image fusion approach using guided filter
Iaetsd a modified image fusion approach using guided filterIaetsd a modified image fusion approach using guided filter
Iaetsd a modified image fusion approach using guided filter
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system
 
iaetsd Unmanned aerial vehicle in the field of agriculture
iaetsd Unmanned aerial vehicle in the field of agricultureiaetsd Unmanned aerial vehicle in the field of agriculture
iaetsd Unmanned aerial vehicle in the field of agriculture
 
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
 
Iaetsd catalytic fuel converters [cfc]
Iaetsd catalytic fuel converters [cfc]Iaetsd catalytic fuel converters [cfc]
Iaetsd catalytic fuel converters [cfc]
 
Iaetsd designing of cmos image sensor test-chip and its characterization
Iaetsd designing of cmos image sensor test-chip and its characterizationIaetsd designing of cmos image sensor test-chip and its characterization
Iaetsd designing of cmos image sensor test-chip and its characterization
 
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
 
Iaetsd study of cracks in structural concrete
Iaetsd study of cracks in structural concreteIaetsd study of cracks in structural concrete
Iaetsd study of cracks in structural concrete
 
Iirdem design and implementation of finger writing in air by using open cv (c...
Iirdem design and implementation of finger writing in air by using open cv (c...Iirdem design and implementation of finger writing in air by using open cv (c...
Iirdem design and implementation of finger writing in air by using open cv (c...
 
Iaetsd march c algorithm for embedded memories in fpga
Iaetsd march c algorithm for embedded memories in fpgaIaetsd march c algorithm for embedded memories in fpga
Iaetsd march c algorithm for embedded memories in fpga
 
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)
 
Iaetsd glitch free nand based digitally controlled delay lines using low power
Iaetsd glitch free nand based digitally controlled delay lines using low powerIaetsd glitch free nand based digitally controlled delay lines using low power
Iaetsd glitch free nand based digitally controlled delay lines using low power
 
Iaetsd solar based energy efficient system
Iaetsd solar based energy efficient systemIaetsd solar based energy efficient system
Iaetsd solar based energy efficient system
 
Iaetsd mapreduce streaming over cassandra datasets
Iaetsd mapreduce streaming over cassandra datasetsIaetsd mapreduce streaming over cassandra datasets
Iaetsd mapreduce streaming over cassandra datasets
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
 

Similaire à iaetsd Robots in oil and gas refineries

Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourcednexgentech15
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computingnexgentechnology
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalBrendan Sweeney
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...ijtsrd
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingIRJET Journal
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 

Similaire à iaetsd Robots in oil and gas refineries (20)

Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
 
C04932125
C04932125C04932125
C04932125
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingA Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 

Plus de Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...Iaetsd Iaetsd
 

Plus de Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
 

Dernier

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Dernier (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

iaetsd Robots in oil and gas refineries

  • 1. ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING WITH OUTSOURCED REVOCATION Manvitha Varsha1 , T. Sree Lakshmi2 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Associate Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. ABSTRACT: Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the overhead computation at private key generator (PKG).In this paper, going for survey on distinct method for handling the basic issue of Identity renouncement. Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator (PKG). However,one of the main drawback of IBE is overheaded computation at PKG during user revocation. The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key- issuing and key-update process leaving only a number of simple operations for PKG and users to perform locally.For this,we generate a hybrid private key for each user, in which an AND gate is used to connect and bound the identity component and time component.But KU-CSP is untrusted. So, we propose a Pseudonym Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key- issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model. Index Terms- 1. INTRODUCTION Identity based encryption system allow any user to generate a public key from a known identity value such as an ASCII string. There is trusted third party, called the Private Key Generator (PKG), who generates the corresponding private keys. For encryption and decryption operations, PKG first publishes a master public key, and then generate the corresponding master private key (referred as master key). Using this master public key, any user can generate a public key corresponding to the identity by combining the master public key with the identity value. To get a corresponding private key, authorized user can use identity ID contacts PKG, which uses the master private key to generate private key for identity ID. As a result, user can encrypt messages with no prior distribution of keys between participants. This is very useful in cases where predistribution of keys is inconvenient because of technical restraints. However, for decryption of message, the authorized user must obtain an appropriate private key from PKG. In this approach the problem is that PKG must be highly trusted, as it has ability to generate any users private key and decryption of message without authorization. Because any user’s private key can be generated using third party’s secret, this system has inherent key assurance. A different systems have been proposed which remove this including certificate-based encryption and secure key issuing cryptography. In PKI setting, revocation is done by appending validity periods to certificates or using combinations of techniques. But, this require management of certificates which is precisely the burden that IBE strives to alleviate. Boneh and Franklin suggested that their private keys can renewed by user periodically and senders use receivers identity with current time period.But this mechanism would results in an overhead at PKG. In another word, all the users even though their keys have been revoked or not, have to contact with private key generator( PKG) periodically to prove their identities and update new private keys. It is needed that PKG must be online and the secure channel has to be maintained for all the transactions, which will become a bottleneck for IBE system as the number of users grows. Many businesses large and ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201615
  • 2. small use cloud computing today either directly or indirectly instead of traditional onsite alternatives. There are a number of reasons like Reduction of costs,Universal access and many more because of which cloud computing is so widely used among businesses today. Thus it require a new working paradigm for introducing cloud services into IBE revocation to fix the issue of efficiency and storage overhead. A naive approach is hand over the private key generators (PKG) master key to the Cloud Service Providers (CSPs). The CSPs then simply update all private keys by using the traditional key update technique and transfer the private keys to unrevoked users. However, this approach is based on an unrealistic assumption that CSPs are fully trusted and are allowed to access the master key for IBE system. But, in practice the public clouds are likely outside of the same trusted domain of users and are curious about users individual privacy. For this reason, a challenge is how to design a secure revocable IBE scheme so that we can reduce the overhead computation at PKG with an untrusted CSP is raised. II. RELATED WORK A Identity-Based Encryption (IBE) is an interesting alternative to public key encryption, which simplify key management in a certificate-based Public Key Infrastructure (PKI) with use of human-intelligible identities (e.g., unique name, IP address ,email address,, etc) as a public keys. D. Boneh and M. Franklin propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. System is based on the Weil pairing and give precise definitions for secure identity based encryption schemes and give several applications for such systems[1]. A. Sahai and B. Waters introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity- Based Encryption. In Fuzzy IBE an identity Is viewed as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ID, to decrypt a cipher text encrypted with an identity, ID’ , if and only if the identities ID and ID’,are close to each other as measured by the set overlap distance metric[2]. The availability of fast and reliable Digital Identities is an essential ingredient for the successful implementation of the public-key infrastructure of the Internet. All digital identity schemes must include a method for revoking someone’s digital identity in the case that this identity is stolen (or canceled) before its expiration date (similar to the cancelation of a credit- cards in the case that they are stolen). W. Aiello, S. Lodha, and R. Ostrovsky proposed an elegant method of identity revocation which requires very little communication between users and verifiers in the system They reduced the overall CA to Directory communication, while still maintaining the same tiny user to vendor communication[3].. III.PROPOSED SYSTEM The proposed system is Pseudonym Generation Scheme with Combining the Identity based encryption and Attribute-based Encryption with Outsourced Revocation in Cloud Computing. we use multiple KU- CSP for key updation. For data security, use an efficient encryption algorithm. For integrity checking, generate meta data before upload the data in cloud. Using the meta data the integrity of the file is verified. In proposed work, we design a method in which each user takes a different pseudonym when accessing cloud services. There is almost no relationship between a user identity and a corresponding pseudonym is provided, and no relationship is provided between the pseudonyms for a single. Pseudonym use will not affect users attestation also reduces the amount of input data representing private user information thus making it almost impossible for attackers to attack on users. In cloud data is stored remotely, user is not aware of any security threat. Data modification can done by the untrusted server ,unauthorized user or by some malicious activity. So user needs to be ensured that their data are intact. For this it is important to check integrity of data. for this proposed system generate meta data and using this meta data we examine the accuracy of data. Proposed Algorithms : Pseudonym Generation algorithm 1.User Identity ID is given as intial input. 2.check wether pseudonym is already generated or not. 3.If yes then give message pseudonym is already generated. 4.If not chose type of pseudonym Alpha/Numeric/Alphanumeric. 5.Use random function to generate random number. 6.Generate pseudonym using random number generated in step 5. 7.Return pseudonym. Key Generation Algorithm 1.select randomly two large prime number p,q 2.Compute n=p*q. Where n is modulus used to generate public key and private key. 3.Compute the function as Ψ(n) = (p*1)(q*1). 4.Select any random number e between 1 and (n) the function value previously calculated in step 3 such that the number is co-prime to '(n) and is not divisor of Ψ (n). 5.Calculate d,which represent modular multiplicative ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201616
  • 3. inverse of e mod Ψ (n). i.e d should satisfy equation e*d mod Ψ (n) =1. 6.private key is represented by d calculated in step 5. V.RESULTS In this section we present the Module description, how it works, practical results and environment. Pseudonym Generation : we generate pseudonym for each user. It take users identity and provide pseudonym.Pseudonyms are usually taken or adopted to hide an individual ones real identity, for example writers’ pen names, or terrorists, and computer hackers fake names. Actors, musicians, and other performers sometimes uses stage names, for example, to hide their ethnic backgrounds. Here we use pseudonym for hide users real identity. Because KU-CSP is untrusted. So adversaries can use the data without permission based on users identity. So we generate pseudonym. Key Generation : For each users private key request on identity ID, PKG firstly checks whether the request identity ID exists in revocation list RL, if so the key generation is aborted. then it generates Private Key (PK) and Outsourcig Key (OK).finally, it sends Private Key to user and Pseudonym with Outsourcing key to KU- CSP respectively. Encryption : user wants to upload any file or message to KUCSP. But KU-CSP is untrusted. So encryption is compulsory.for security we use attribute based encryption with identity based encryption scheme.Here a user can encrypt a message M under Pseudonym P with attributes and time period Ti. This provides the ciphertext (CT). Then user can upload this ciphertext to KU-CSP. Decryption : user wants to download any file or message from KU-CSP.user uses his private key send by PKG and decrypt the message. Here the ciphertext CT is encrypted under P with attributes and Ti, and the user has a private key PK, this provides original message M. Revocation : If the private keys of some users get compromised, PKG must provide a mean to revoke such users from system.If users with identities in the set that are to be revoked at time period Ti, PKG updates the revocation list as RL as well as the time list TL through linking the newly created time period Ti+1 onto original list TL. Finally send a copy for the updated revocation list RL as well as the new time period Ti+1 to KU-CSP. Key Updation : Upon receiving a key-update request on pseudonym, firstly KU-CSP checks whether ID exists in the revocation list RL, if so KU-CSP returns null and key-update is aborted. Otherwise it returns Updated Key (TK) and keyupdate is KU-CSP fetches the corresponding entry Id with outsourcing key in the user list UL. In this section we provide the Results on basis of Construction of Proposed system. We evaluate Time required to respond by single CSP compared to time required by multiple CSP. VI.CONCLUSION AND FUTURE Focusing on issue of identity revocation, we have introduced outsourcing computation into IBE and proposed a revocable scheme in which the revocation operations are delegated to CSP. User needs not to contact with PKG during key-update, in other words, PKG is allowed to be offline after sending the revocation list to KU-CSP. It do not require secure channel or user authentication during key-update between user and KU-CSP. Furthermore as KUCSP is untrusted we use pseudonym for each user so that adversary can not get real identity of user.we combine the Identitybased and Attribute-based Encryption which will provide more security to user.For integrity checking, generate meta data before upload the data in cloud. Using this meta data the integrity of the file is verified REFERENCES [1] W Aiello, S Lodha, & R Ostrovsky. (1998). Fast digital identity revocation. Advances in Cryptology – CRYPTO’98. Springer. [2] V Goyal. (2007). Certificate revocation using fine grained certificate space partitioning. Financial Cryptography and Data Security (LNCS). Berlin: Springer. Vol. 4886, pp. 247–259. [3] F Elwailly, C Gentry, & Z Ramzan. (2004). Quasimodo: Efficient certificate validation and revocation. Public Key Cryptography (LNCS). Berlin: Springer. Vol. 2947, pp. 375–388. [4] D Boneh, & M Franklin. (2001). Identity-based encryption from the weil pairing. Advances in Cryptology – CRYPTO 2001 (LNCS). Berlin: Springer. Vol. 2139, pp. 213–229. [5] A Boldyreva, V Goyal, & V Kumar. (2008). Identity-based encryption with efficient revocation. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201617
  • 4. In: Proceedings of the 15th ACM Conf. on Comp. and Comm. Security. NewYork: ACM. pp. 417–426. [6] A Sahai, & B Waters. (2005). Fuzzy identity-based encryption. Advances in Cryptology EUROCRYPT 2005 (LNCS). Berlin: Springer. Vol. 3494, pp. 557–557. [7] R Canetti, B Riva, & GN Rothblum. (2011). Two 1- round protocols for delegation of computation. Cryptology ePrint Archive, Report 2011/518. [8] U Feige, & J Kilian. (1997). Making games short. Proceedings of the 29th annual ACM Symp. on Theory of Computing. New York: ACM. pp. 506–516. [9] S Hohenberger, & A Lysyanskaya. (2005). How to securely outsource cryptographic computations. Proceedings of the 2nd Inter. Conf. on Theory of Cryptography. Berlin: Springer- Verlag. pp. 264–282. [10] R Canetti, B Riva, & G Rothblum. (2012). Two protocols for delegation of computation. Information Theoretic Security (LNCS). Berlin: Springer. Vol. 7412, pp. 37–61. [11] X Chen, J Li, J Ma, Q Tang, & W Lou. (2012). New and secure outsourcing algorithms of modular exponentiations. 17th European Symp. on Research in Computer Security, 2012. [12] MJ Atallah, & KB Frikken. (). Securely outsourcing linear algebra computations. Proceedings of the 5th ACM Symp. on Information, Computer and Communications Security. New York: ACM. pp. 48–59. [13] A Shamir. (1985). Identity-based cryptosystems and signature schemes. Advances in Cryptology – CRYPTO (LNCS). Berlin: Springer. Vol. 196, pp. 47–53. [14] C Cocks. (2001). An identity based encryption scheme based on quadratic residues. Cryptography and Coding (LNCS). Berlin: Springer. Vol. 2260, pp. 360–363. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201618