Call for Paper - January 2021 Edition
IJCA solicits original research papers for the January 2021 Edition. Last date of manuscript submission is December 21, 2020. Read More

Novel Approach for improving Security and Confidentiality in Public Clouds using Certificateless Encryption

Print
PDF
IJCA Proceedings on International Conference on Cognitive Knowledge Engineering
© 2018 by IJCA Journal
ICKE 2016 - Number 1
Year of Publication: 2018
Authors:
Chudaman Devidasrao Sukte
Emmanuel M.
Ratnadeep R. Deshmukh

Chudaman Devidasrao Sukte, Emmanuel M. and Ratnadeep R Deshmukh. Article: Novel Approach for improving Security and Confidentiality in Public Clouds using Certificateless Encryption. IJCA Proceedings on International Conference on Cognitive Knowledge Engineering ICKE 2016(1):8-12, January 2018. Full text available. BibTeX

@article{key:article,
	author = {Chudaman Devidasrao Sukte and Emmanuel M. and Ratnadeep R. Deshmukh},
	title = {Article: Novel Approach for improving Security and Confidentiality in Public Clouds using Certificateless Encryption},
	journal = {IJCA Proceedings on International Conference on Cognitive Knowledge Engineering},
	year = {2018},
	volume = {ICKE 2016},
	number = {1},
	pages = {8-12},
	month = {January},
	note = {Full text available}
}

Abstract

In order to assure confidentiality of sensitive information stored in public clouds, a commonly embrace approach is to encrypt the information before uploading it to the cloud. Since the cloud does not know the keys used to encrypt the information, the confidentiality of the information from the cloud is assured. However, as many organizations are required to enforce fine-grained access control to the information, the encipher mechanism should also be able to provide fine-grained encryption-based access control. Proposed work solves the key escrow problem and revocation problem of the previous systems and performs only a single encryption of each data item and minimize the overhead at the data owner.

References

  • Peter Mell, Timothy Grance "The NIST Defination of Cloud Computing," NIST, U. S. , 2011
  • Margaret Rouse "What is public cloud? Definition from WhatIs. com", 2015. [Online]. Available: http://searchcloudcomputing. techtarget. com/definition/public cloud [Accessed:27- Dec- 2015].
  • Interroute "What is a Hybrid Cloud?,"2015. [Online]. Available:http:// www. interoute. com/cloud article/what hybrid cloud. [Accessed: 27-Dec-2015].
  • InformationWeek, "Why IT Needs To Push Data Sharing Efforts InformationWeek", 2015. [Online]. Available: http://www. informationweek. com/services/integration/why it needs to push data sharing effort/225700544. [Accessed: 27- Dec- 2015].
  • Zhou M, Zhang R, Xie W, Qian W, Zhou A "Security and privacy in cloud computing: a survey". Sixth International conferences on Semantics knowledge and grid (SKG) pp 105-112, 2010.
  • Danan Thilakanathan, Shiping Chen, Surya Nepa and Rafael A, "Secure Data Sharing in the Cloud", S. Nepal, M. Pathan, Security, Privacy and Trust in Cloud Systems, Springer Verlag Berlin Heildelberg 2014.
  • Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y, "Fine grained data access control systems with user accountability in cloud computing",IEEE second international conference on cloud computing technology and science(Cloud com), pp 89-96, 2010.
  • Tu S, Niu S, Li H, Xiao ming Y,Li M,"Fine grained access control and revocation for sharing data on clouds," IEEE 26th international parallel and distributed processing symposium workshops and PhD forum (IPDPSW),pp 2146-2155, 2012.
  • Dan Boneh and Matt Franklin, "Identity Based Encryption from the Weil Pairing," SIAM Journal on Computing, 32(3): 586-615, 2003.
  • S. Al Riyami, K. Paterson, "Certificateless public key cryptography," in Proc. ASI ACRYPT, C. S. Liah, Ed Berlin, Germany: Springer, LNCS 2894, pp. 452- 473, 2003.
  • Sherman S. M. Chow, Colin Boyd, and Juan Manuel G. Nieto, "Security Mediated Certificateless Cryptograph", Public key Cryptology- PKC (LNCS), 3958, pp. 508-524, 2006.
  • Lei Xu, Xiaoxin Wu and Xinwen Zhang,"CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud," ASIACCS'12, May 2-4, 2012.
  • Garykessler. net, "An Overview of Cryptography", 2015. [Online]. Available: http://www. garykessler. net/library/crypto. html. [Accessed: 27- Dec- 2015].
  • Seung-Hyun Seo, Mohamed Nabeel. "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds". IEEE transactions on knowledge and data engineering, Vol No. 26, Issue: 9, pages: 2107-2119, Sept 2014.
  • A. Kahate, "cryptography and network security". mc graw hill, pp. 38-198, 2016.