首页    期刊浏览 2025年05月17日 星期六
登录注册

文章基本信息

  • 标题:An Identity Combined With Attribute Based Proxy Uploading and Integrity Checking in Public Cloud
  • 本地全文:下载
  • 作者:Pallavi S. Kaulage ; Prof. Dr. S. N. Kini
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2017
  • 卷号:5
  • 期号:6
  • 页码:11076
  • DOI:10.15680/IJIRCCE.2017.0506011
  • 出版社:S&S Publications
  • 摘要:The cloud-based outsourced stockpiling alleviates the customer's weight of capacity administration anduprightness protection by giving an identically versatile, modest, area autonomous stage. It permits the customers tocheck information wholeness and accuracy with no downloading the whole information on neighbourhood machine.From the security issues, we propose a novel Identity-Based Proxy-Oriented Data Uploading and Remote DataIntegrity Checking with Proxy re-encryption Scheme in Public Cloud. Intermediary re-encryption is a moderatelyrecently formulated cryptographic primitive. The objective of intermediary re-encryption is to safely empower the reencryptionof cipher texts from OriginalClient in intermediary. That implies, in existing OriginalClient has enormousinformation to be transferred to PCS (Public Cloud Server) by the assigned intermediary. For security, he encodes hisinformation in view of Identity Based Public Key then forward to the intermediary for transfer to PCS. Intermediary isapproved to handle the OriginalClient's ciphertext and transfer them, is chosen and approved by OriginalClient. At thepoint when Proxy fulfils the warrant mω (that implies OriginalClient's ciphertext) which is marked and issued byOriginalClient, it can handle and transfer the first customer's ciphertext; else, it can't play out the strategy. This currentprocedure has just a single encryption in OriginalClient. So it has less security. An assailant might be hacks thisinformation. So we extend the current way to deal with intermediary re-encryption Scheme. . We have improved role ofproxy by assigning duties like ID based re-encryption, delegate uploading and delegate integrity checking. In thisScheme Proxy at the end of the day scramble that OriginalClient's ciphertext and afterward transfer to PCS.
  • 关键词:Cloud Computing; ID –Based Encryption; Pseudonym; Attribute Based Encryption; Index Switcher.
国家哲学社会科学文献中心版权所有