SlideShare una empresa de Scribd logo
1 de 6
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN
CLOUD COMPUTING
ABSTRACT
Identity-based encryption (ibe) which simplifies the public key and certificate
management at public key infrastructure (pki) is an important alternative to public key
encryption. However, one of the main efficiency drawbacks of ibe is the overhead
computation at private key generator (pkg) during user revocation. Efficient revocation has
been well studied in traditional pki setting, but the cumbersome management of certificates is
precisely the burden that ibe strives to alleviate.
In this paper, aiming at tackling the critical issue of identity revocation, we
introduce outsourcing computation into IBE for the first time and propose a revocable IBE
scheme in the server-aided setting. Our scheme offloads most of the key generation related
operations during key-issuing and key-update processes to a Key Update Cloud Service
Provider, leaving only a constant number of simple operations for PKG and users to perform
locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a
hybrid private key for each user, in which an AND gate is involved to connect and bound the
identity component and the time component. Furthermore, we propose another construction
which is provable secure under the recently formulized Refereed Delegation of Computation
model. Finally, we provide extensive experimental results to demonstrate the efficiency of
our proposed construction.
EXISTING SYSTEM
There exists g1, g2 ∈ G with e(g1, g2) 1, in other words, the map does not send all
pairs in G×G to the identity in GT.
Upon receiving a keyupdate request on ID, KU-CSP firstly checks whether ID exists
in the revocation list RL, if so KU-CSP returns ⊥ and key-update is aborted.
In RDoC model, the client is able to interact with multiple servers and it has a right
output as long as there exists one server that follows the proposed protocol. One of the most
advantages of RDoC over traditional model with single server is that the security risk on the
single server is reduced to multiple servers involved in. As the result of both the practicality
and utility, RDoC model recently has been widely utilized in the literature of outsourced
computation.
PROPOSE SYSTEM
Which is proposed to simplify key management in a certificate-based Public Key
Infrastructure (PKI) by using human-intelligible identities (e.g., unique name, email address,
IP address, etc) as public keys. we introduce outsourcing computation into IBE for the first
time and propose a revocable IBE scheme in the server-aided setting.
We propose a scheme to offload all the key generation related operations during key-
issuing and key-update, leaving only a constant number of simple operations for PKG and
eligible users to perform locally.
Based on the system model proposed, we are able to define the outsourced revocable
IBE scheme. Compared with the traditional IBE definition, the KeyGen, Encrypt and Decrypt
algorithms are redefined as follows to integrate time component. proposed a way for users to
periodically renew their private keys without interacting with PKG.The authors utilized proxy
re-encryption to propose a revocable ABE scheme.
ALGORITHM
The setup algorithm takes as input a security parameter λ and outputs the public key
PK and the master key MK. Note that the master key is kept secret at PKG.
The private key generation algorithm is run by PKG, which takes as input the master
key MK and user’s identity ID ∈ {0, 1}∗. It returns a private key SKID corresponding to the
identity ID.
The encryption algorithm is run by sender, which takes as input the receiver’s identity
ID and a message M to be encrypted. It outputs the ciphertext CT.
The decryption algorithm is run by receiver, which takes as input the ciphertext CT
and his/her private key SKIDs . It returns a message M or an error ⊥.
IMPLEMENTATION:
Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and
be effective.
The implementation stage involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods to achieve changeover and
evaluation of changeover methods.
MODULE DESCRIPTION:
Number of Modules;
After careful analysis the system has been identified to have the following modules:
1.Client Module
i.Identity-based Encryption Authentication Module.
ii.Public Key Generator Module.
2.Private Key Generator Module.
3.Server Module
i.Graph Module
1.Client Module
i.Identity-based Encryption Authentication Module.
A trustee-based social authentication includes two phases:.
 Registration Phase:
The system prepares trustees for a user Alice in this phase. Specifically, Alice
is first authenticated with her main authenticator (i.e., password),and then a
few(e.g., 5) friends, who also have accounts in the system, are selected by
either Alice herself or the service provider from Alice’s friend list and are
appointed as Alice’s trustees.
ii.Public Key Generator Module.
Authentication is essential for securing your account and preventing upload your data
encrypted file store from database. Imagine a phishing email being sent from your mail
because someone had forged your information. Angry recipients and spam complaints
resulting from it become your mess to clean up, in order to repair your reputation. Identity-
based Encryption social authentication systems ask users to select their own trustees without
any constraint. In our experiments we show that the service provider can constrain Identity-
based Encryption selections via imposing that no users are selected as Identity-based
Encryption by too many other users, which can achieve better security guarantees.
2.Private Key Generator.
They are short in storage for both private key at user and binary tree structure at PKG.
We specify that in this work we also aim to utilize outsourcing computation technique to
deliver overhead computation to KU-CSP so that PKG is able to be offline in keyupdate.
1) It achieves constant efficiency for both computation at PKG and private key size at
user;
2) User needs not to contact with PKG during key-update, in other words, PKG is
allowed to be offline after sending the revocation list to KU-CSP;
3) No secure channel or user authentication is required during key-update between
user and KU-CSP.
3.Server Module
Server module first PKG send the key. After check the keyword user key and sever
key is matching server approved the file. Not matching don’t data download. This is work
main concept of paper. Keyword matching meaning server send the new key from user.
Graph module is using how many key in generator in server collection.
CONCLUSION
In this paper, focusing on the critical issue of identity revocation, we introduce
outsourcing computation into IBE and propose a revocable scheme in which the revocation
operations are delegated to CSP. With the aid of KU-CSP, the proposed scheme is full-
featured: 1) It achieves constant efficiency for both computation at PKG and private key size
at user; 2) User needs not to contact with PKG during key-update, in other words, PKG is
allowed to be offline after sending the revocation list to KU-CSP; 3) No secure channel or
user authentication is required during key-update between user and KU-CSP.
Furthermore, we consider to realize revocable IBE under a stronger adversary model.
We present an advanced construction and show it is secure under RDoC model, in which at
least one of the KU-CSPs is assumed to be honest. Therefore, even if a revoked user and
either of the KU-CSPs collude, it is unable to help such user re-obtain his/her decryptability.
Finally, we provide extensive experimental results to demonstrate the efficiency of
our proposed construction

Más contenido relacionado

Destacado

Destacado (9)

Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
FEMINISM
FEMINISMFEMINISM
FEMINISM
 
Строительная техника Sany
Строительная техника SanyСтроительная техника Sany
Строительная техника Sany
 
Script
Script Script
Script
 
Working with Media and Sponsors
Working with Media and SponsorsWorking with Media and Sponsors
Working with Media and Sponsors
 
How to Advance your Career
How to Advance your CareerHow to Advance your Career
How to Advance your Career
 

Más de CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
CloudTechnologies
 

Más de CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Identity based encryption with outsourced revocation in cloud computing

  • 1. IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING ABSTRACT Identity-based encryption (ibe) which simplifies the public key and certificate management at public key infrastructure (pki) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of ibe is the overhead computation at private key generator (pkg) during user revocation. Efficient revocation has been well studied in traditional pki setting, but the cumbersome management of certificates is precisely the burden that ibe strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction. EXISTING SYSTEM There exists g1, g2 ∈ G with e(g1, g2) 1, in other words, the map does not send all pairs in G×G to the identity in GT. Upon receiving a keyupdate request on ID, KU-CSP firstly checks whether ID exists in the revocation list RL, if so KU-CSP returns ⊥ and key-update is aborted.
  • 2. In RDoC model, the client is able to interact with multiple servers and it has a right output as long as there exists one server that follows the proposed protocol. One of the most advantages of RDoC over traditional model with single server is that the security risk on the single server is reduced to multiple servers involved in. As the result of both the practicality and utility, RDoC model recently has been widely utilized in the literature of outsourced computation. PROPOSE SYSTEM Which is proposed to simplify key management in a certificate-based Public Key Infrastructure (PKI) by using human-intelligible identities (e.g., unique name, email address, IP address, etc) as public keys. we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. We propose a scheme to offload all the key generation related operations during key- issuing and key-update, leaving only a constant number of simple operations for PKG and eligible users to perform locally. Based on the system model proposed, we are able to define the outsourced revocable IBE scheme. Compared with the traditional IBE definition, the KeyGen, Encrypt and Decrypt algorithms are redefined as follows to integrate time component. proposed a way for users to periodically renew their private keys without interacting with PKG.The authors utilized proxy re-encryption to propose a revocable ABE scheme. ALGORITHM The setup algorithm takes as input a security parameter λ and outputs the public key PK and the master key MK. Note that the master key is kept secret at PKG.
  • 3. The private key generation algorithm is run by PKG, which takes as input the master key MK and user’s identity ID ∈ {0, 1}∗. It returns a private key SKID corresponding to the identity ID. The encryption algorithm is run by sender, which takes as input the receiver’s identity ID and a message M to be encrypted. It outputs the ciphertext CT. The decryption algorithm is run by receiver, which takes as input the ciphertext CT and his/her private key SKIDs . It returns a message M or an error ⊥. IMPLEMENTATION: Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. MODULE DESCRIPTION: Number of Modules; After careful analysis the system has been identified to have the following modules: 1.Client Module i.Identity-based Encryption Authentication Module. ii.Public Key Generator Module. 2.Private Key Generator Module. 3.Server Module i.Graph Module
  • 4. 1.Client Module i.Identity-based Encryption Authentication Module. A trustee-based social authentication includes two phases:.  Registration Phase: The system prepares trustees for a user Alice in this phase. Specifically, Alice is first authenticated with her main authenticator (i.e., password),and then a few(e.g., 5) friends, who also have accounts in the system, are selected by either Alice herself or the service provider from Alice’s friend list and are appointed as Alice’s trustees. ii.Public Key Generator Module. Authentication is essential for securing your account and preventing upload your data encrypted file store from database. Imagine a phishing email being sent from your mail because someone had forged your information. Angry recipients and spam complaints resulting from it become your mess to clean up, in order to repair your reputation. Identity- based Encryption social authentication systems ask users to select their own trustees without any constraint. In our experiments we show that the service provider can constrain Identity- based Encryption selections via imposing that no users are selected as Identity-based Encryption by too many other users, which can achieve better security guarantees. 2.Private Key Generator.
  • 5. They are short in storage for both private key at user and binary tree structure at PKG. We specify that in this work we also aim to utilize outsourcing computation technique to deliver overhead computation to KU-CSP so that PKG is able to be offline in keyupdate. 1) It achieves constant efficiency for both computation at PKG and private key size at user; 2) User needs not to contact with PKG during key-update, in other words, PKG is allowed to be offline after sending the revocation list to KU-CSP; 3) No secure channel or user authentication is required during key-update between user and KU-CSP. 3.Server Module Server module first PKG send the key. After check the keyword user key and sever key is matching server approved the file. Not matching don’t data download. This is work main concept of paper. Keyword matching meaning server send the new key from user. Graph module is using how many key in generator in server collection. CONCLUSION In this paper, focusing on the critical issue of identity revocation, we introduce outsourcing computation into IBE and propose a revocable scheme in which the revocation operations are delegated to CSP. With the aid of KU-CSP, the proposed scheme is full- featured: 1) It achieves constant efficiency for both computation at PKG and private key size at user; 2) User needs not to contact with PKG during key-update, in other words, PKG is allowed to be offline after sending the revocation list to KU-CSP; 3) No secure channel or user authentication is required during key-update between user and KU-CSP. Furthermore, we consider to realize revocable IBE under a stronger adversary model. We present an advanced construction and show it is secure under RDoC model, in which at least one of the KU-CSPs is assumed to be honest. Therefore, even if a revoked user and either of the KU-CSPs collude, it is unable to help such user re-obtain his/her decryptability.
  • 6. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction