A UNIQUE ASSISTANCE THAT PROVIDES GUARANTEE THE HIDING OF DATA

Chillakuru Prathima, N Venkatadri

Abstract


The fundamental dependence on the services is to be sure the confidentiality from the data. This paper, the very first time, proposes a privacy-preserving cipher text multi-discussing mechanism to offer the above qualities. By utilizing some traditional PKE, Identity-Based File encryption (IBE), or Attribute-Based File encryption (ABE), the confidentiality from the record could be protected effectively. It combines the merits of proxy re-file encryption with anonymous technique where a cipher text could be safely and conditionally shared multiple occasions without dripping both understanding of underlying message and also the identity information of cipher text senders/recipients. The necessity of secure big data storage services are more inviting than ever before up to now. The safety type of MH-IBCPRE may be the fundamental one, where a challenger plays the sport using the foe to produce Selected-Cipher text Attacks (CCA) towards the original cipher text and re-encrypted cipher text to be able to solve a tough problem. However, the anonymity from the service clients, probably the most essential facets of privacy, should be thought about concurrently. In addition, this paper implies that the brand new primitive is safe against selected-cipher text attacks within the standard model. Furthermore, the service should also provide practical and fine-grained encrypted data discussing so that an information owner is permitted to talk about a cipher text of information amongst others under some specified conditions.


Keywords


Privacy; Anonymity; Proxy Re-Encryption; Big Data;

References


K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbased revocable identity-based proxy re-encryption scheme for public clouds data sharing,” in Computer Security–ESORICS (Lecture Notes in Computer Science), vol. 8712. Berlin, Germany: Springer-Verlag, Sep. 2014, pp. 257–272.

M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 4521. Berlin, Germany: Springer-Verlag, 2007, pp. 288–306.

X. Boyen and B. Waters, “Anonymous hierarchical identity-based encryption (without random oracles),” in Advances in Cryptology–CRYPTO (Lecture Notes in Computer Science), vol. 4117. Berlin, Germany: Springer-Verlag, Aug. 2006, pp. 290–307.

T. Matsuo, “Proxy re-encryption systems for identity-based encryption,” in Pairing-Based Cryptography (Lecture Notes in Computer Science), vol. 4575. Berlin, Germany: Springer-Verlag, 2007, pp. 247–267.

B. Waters, “Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions,” in Advances in Cryptology–CRYPTO (Lecture Notes in Computer Science), vol. 5677. Berlin, Germany: Springer-Verlag, 2009, pp. 619–636.

K. Emura, A. Miyaji, and K. Omote, “An identity-based proxy re-encryption scheme with source hiding property, and its application to a mailing-list system,” in Public Key Infrastructures, Services and Applications (Lecture Notes in Computer Science), vol. 6711. Berlin, Germany: Springer-Verlag, 2011, pp. 77–92.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.