IJETST
  • Register
  • Login
##common.pageHeaderLogo.altText##
  • Home
  • About
    • Editorial Team
    • About the Journal
  • Current
  • Archives
  • Submissions
  • Contact
Advanced Search
  1. Home
  2. Archives
  3. Vol. 2 No. 01 (2015): January Issue
  4. Articles

Vol. 2 No. 01 (2015)

January 2015

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

  • Dayananda RB
  • Prof. Dr. G. Manoj Someswar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 01 (2015), 6 January 2015
Published 6 January 2015

  • View Article
  • Download
  • Cite
  • Reference
  • Statastics
  • Share

Abstract

Abstract: In this research paper, we will describe the system model and security model in our scheme and provide our design goals and related assumptions. We consider a cloud computing environment consisting of a cloud service provider (CSP), a data owner, and many users. The CSP maintains cloud infrastructures, which pool the bandwidth, storage space, and CPU power of many cloud servers to provide 24/7 services. We assume that the cloud infrastructures are more reliable and powerful than personal computers. In our system, the CSP mainly provides two services: data storage and re-encryption. After obtaining the encrypted data from the data owner, the CSP will store the data on several cloud servers, which can be chosen by the consistent hash function, where the input of the consistent hash function is the key of the data, and the outputs of the consistent hash function are the IDs of the servers that store the data. On receiving a data access request from a user, the CSP will re-encrypt the cipher text based on its own time, and return the re-encrypted cipher text.

    PDF

How to Cite

RB, D., & Someswar, P. D. G. M. (2015). Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment. International Journal of Emerging Trends in Science and Technology, 2(01). Retrieved from http://www.ijetst.in/index.php/ijetst/article/view/456
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

  • Download Citation

    • Endnote/Zotero/Mendeley (RIS)
    • BibTeX

    References

    1. K. D. Edoh. Elliptic curve cryptography: Java implementation. In Proceedings of the 1st Annual Conference on Information Security Curriculum Development, InfoSecCD ‘04. ACM, 2004.
    2. Google. Google Health, 2011. https://www.google.com/health.
    3. B. W. John Bethencourt, Amit Sahai. Advanced crypto software collection, Feb 2011. http://acsc.cs.utexas.edu/cpabe/.
    4. P. Junod and A. Karlov. An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. In Proceedings of the 10th Annual ACM Workshop on Digital Rights Management, DRM ‘10, 2010.
    5. D. R. Levinson. Audit of information technology security included in health information technology standards, May 2011. http: //oig.hhs.gov/oas/reports/ other/180930160.pdf
    6. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Advances in Cryptology -EUROCRYPT 2010. Springer, 2010.
    7. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of the 29th IEEE Conference on Information Communications (INFOCOM’10), San Diego, 2010.
    8. M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and Privacy in Communication Networks. Springer, 2010.
    9. N. Liu, Y. Zhou, X. Niu, and Y. Yang. Querying encrypted character data in DAS model. In Proceedings of the 2nd International Conference on Networking and Digital Society (ICNDS), May 2010.
    10. B. Lynn. The pairing-based cryptography library, Feb 2011. http: //crypto. Stanford, edu/pbc/.
    11. K. Mandl, W. Simons, W. Crawford, and J. Abbett. Indivo: a personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making, 2007.
    • Article Viewed: 82 Total Download

    Downloads

    Download data is not yet available.

    ##plugins.themes.ojsPlusA.frontend.article.downloadstatastics##

    • Linkedin
    • Twitter
    • Facebook
    • Telegram

    Make a Submission

    Make a Submission

    Current Issue

    • Atom logo
    • RSS2 logo
    • RSS1 logo

    Information

    • For Readers
    • For Authors
    • For Librarians
    Keywords
    • Home
    • Archives
    • Submissions
    • About the Journal
    • Editorial Team
    • Contact
     Open Access Policy || Publication & Peer Review Policy || Publication Ethics
    The publication is licensed under a Creative Commons License (CC BY). View Legal Code
    Copyright © 2018 All Rights Reserved, International journal of Emerging Trends in Science and Technology | Powered By IJETST
    International journal of Emerging Trends in Science and Technology