Abstract

In Cloud computing, the computing resources are provided as services of the Internet. Cloud computing allows users to access applications on demand without installation. It also allows storing and accessing data by using any computer that has Internet access. Because the data is shared over the Cloud, the data must be encrypted to preserve its confidentiality. There are a variety of Proxy Re-Encryption (PRE) schemes which provide access control and security over the network. These mainly include Broadcast PRE (BPRE), Conditional PRE (CPRE) and Identity-based PRE (IPRE). The preceding PRE schemes were projected in the conventional public key infrastructure. This required complex certificate management. Therefore, Identity-based PRE (IPRE) using forward security has been proposed in this paper. In the proposed system, the Data Owner is capable of storing the data in an encrypted form in the Cloud server of a Cloud Service Provider (CSP), by first sending the data in encrypted form to the Trustworthy Third Party (TTP). The TTP will again re-encrypt that data. The data owner is also capable of upgrading, scaling and retrieving the data stored in the cloud server. The data owner applies access control to the data that is outsourced. Also, in the event of dispute regarding data integrity, a TTP is able to decide on the user that is dishonest. Finally, we tend to demonstrate associate claim of our scheme to protected cloud storage scheme advantageous over existing protected schemes.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.