期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2017
卷号:5
期号:6
页码:11076
DOI:10.15680/IJIRCCE.2017.0506011
出版社:S&S Publications
摘要:The cloud-based outsourced stockpiling alleviates the customer's weight of capacity administration anduprightness protection by giving an identically versatile, modest, area autonomous stage. It permits the customers tocheck information wholeness and accuracy with no downloading the whole information on neighbourhood machine.From the security issues, we propose a novel Identity-Based Proxy-Oriented Data Uploading and Remote DataIntegrity Checking with Proxy re-encryption Scheme in Public Cloud. Intermediary re-encryption is a moderatelyrecently formulated cryptographic primitive. The objective of intermediary re-encryption is to safely empower the reencryptionof cipher texts from OriginalClient in intermediary. That implies, in existing OriginalClient has enormousinformation to be transferred to PCS (Public Cloud Server) by the assigned intermediary. For security, he encodes hisinformation in view of Identity Based Public Key then forward to the intermediary for transfer to PCS. Intermediary isapproved to handle the OriginalClient's ciphertext and transfer them, is chosen and approved by OriginalClient. At thepoint when Proxy fulfils the warrant mω (that implies OriginalClient's ciphertext) which is marked and issued byOriginalClient, it can handle and transfer the first customer's ciphertext; else, it can't play out the strategy. This currentprocedure has just a single encryption in OriginalClient. So it has less security. An assailant might be hacks thisinformation. So we extend the current way to deal with intermediary re-encryption Scheme. . We have improved role ofproxy by assigning duties like ID based re-encryption, delegate uploading and delegate integrity checking. In thisScheme Proxy at the end of the day scramble that OriginalClient's ciphertext and afterward transfer to PCS.
关键词:Cloud Computing; ID –Based Encryption; Pseudonym; Attribute Based Encryption; Index Switcher.