Capability Of Certificateless Cryptography For Secure Data Sharing Over the Network

Authors

  • Gondake Pushpalata B Final Year Student of Department of Computer engineering, Jaihind College of engineering, kuran
  • Khandagale Pallavi R Final Year Student of Department of Computer engineering, Jaihind College of engineering, kuran
  • Tanpure Vidya S Final Year Student of Department of Computer engineering, Jaihind College of engineering, kuran
  • Prof. S.K.Said Assistant Professor of Department of Computer engineering, Jaihind College of engineering, kuran

Keywords:

Cloud computing, certificateless cryptography, confidentiality, network access control.

Abstract

The mediated certificateless encryption scheme without pairing operations for the securely
sharing sensitive information over the public clouds. Mediated certificateless public key encryption
(mCL-PKE) solves problem of the key escrow in the identity based encryption and certificate revocation
problem in public key of cryptography. mCL-PKE scheme does not utilize paring operations. Since most
CL-PKC schemes are based on the bilinear pairing which are computationally expensive. The security
mediator acts as a policy enforcement point as well supports instantaneous revocation of compromised
or malicious users. It is more efficient than the pairing based scheme. By applying mCL-PKE scheme can
construct the practical solution to the problem of sharing the sensitive information in the public
network.The cloud is employed as a the secure storage as well as a key generation center. In our system,
the data owner encrypts the sensitive data using the cloud generated by users’ public keys based on its
access control policies and uploads the encr ypted data to the cloud. Upon successful
authorization, of public cloud partially decrypts the encrypted data for the users.

Published

2017-05-25

How to Cite

Gondake Pushpalata B, Khandagale Pallavi R, Tanpure Vidya S, & Prof. S.K.Said. (2017). Capability Of Certificateless Cryptography For Secure Data Sharing Over the Network. International Journal of Advance Research in Engineering, Science & Technology, 4(5), 273–280. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1531