Uniqueness Based Records Out Cause With Complete Audit In The Clouds
Abstract
CRA must retain an arbitrary confidential value for users without affecting the security of the revocable IBE plan. In the Search Engine Optimization and Elmira Plan, for each user, each user creates a secret key by hitting some partial keys, which depend on the partial keys that grandparents use in the hierarchy tree. Another drawback is the lack of scalability, which means that the KU-CSP should have a secret value for each user. In this article, we recommend a new, revocable IBE plan with Cloud Revocation Authority to address each of the shortcomings, i.e. the performance is greatly improved and the CRA maintains system confidentiality for users only. Finally, we expanded the proposed IBE revocable plan to provide a CRA-supported certification plan for a limited time period to manage multiple cloud services. In the current system, bad-behaved users / at-risk in ID-PKS configuration are naturally high. The immediate cancellation method employs a reliable web-authorizing authority to reduce the burden of PKG management and help users decode the encrypted text. For experimental results and reward analysis, our plan is perfect for mobile devices. For security analysis, we make it clear that our plan is completely safe against adaptive recognition attacks according to Daffier-Hellman's two-pronged assumption. Outlines define the structure of an IBE cancellable plan with CRA and define their own security concepts to design potential threats and attacks. CRA Assisted Authentication Plan with Limited Time Rights to Manage Multiple Cloud Services.
References
J. Li, J. Li, X. Chen, C. Jia, and W. Lou, “Identity-based encryption with outsourced revocation in cloud computing,” IEEE Trans. On Computers, vol. 64, no. 2, pp. 425-437, 2015.
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, and Chung-Peng Huang, “Identity-Based Encryption with CloudRevocation Authority and Its Applications”, ieee trans. Cloud computing 2016.
A. Sahai, H. Seyalioglu, and B. Waters, ”Dynamic credentials and ciphertext delegation for attribute-based encryption,” Proc. Crypto’12, LNCS, vol. 7417 , pp. 199-217, 2012.
Y.-M. Tseng, T.-Y.Wu, and J.-D.Wu, “A pairing-based user authentication scheme for wireless clients with smart cards,” Informatica, vol. 19, no. 2, pp. 285-302, 2008.
D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, “A Method for fast revocation of public key certificates and security capabilities,” Proc. 10th USENIX Security Symp., pp. 297-310. 2001.
R. Housley, W. Polk, W. Ford, and D. Solo, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” IETF, RFC 3280, 2002.
T. Kitagawa, P. Yang, G. Hanaoka, R. Zhang, K. Matsuura, and H. Imai, “Generic transforms to acquire CCA-security for identity based encryption: The Cases of FOPKC and REACT,” Proc. ACISP’06, LNCS, vol. 4058, pp. 348-359, 2006.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.