Identity based and attribute based cryptography overcoming the cloud security issue while outsourcing cloud data.

Authors

  • Pooja S. Naik MCA DEPARTMENT JNEC AURANGABAD (M.S-431003)
  • Prof. Vinod S. Agrawal MCA DEPARTMENT JNEC AURANGABAD (M.S-431003)

Keywords:

cryptography, security, cloud computing.

Abstract

An extension of the cryptographic technique of identity-based encryption (IBE), our proposed ABE scheme
can serve as the basis of an access-control architecture in which entities require no interaction with a trusted authority in
order to gain access to sensitive data. Changing scenario of cryptography has led to a change in paradigm of from
certificate based public keys and key rings to user-dependent keys which are based on identities of users or their
attributes. This is termed as identity based cryptography or attribute based cryptography. Such encryption schemes are
much relevant in current scenario of cloud computing and mobile computing where participation of user in transactions is
partial, or user-based access control over an encrypted database is required. This paper presents a survey of identity based
and attribute based cryptographic primitives

Published

2017-10-25

How to Cite

Pooja S. Naik, & Prof. Vinod S. Agrawal. (2017). Identity based and attribute based cryptography overcoming the cloud security issue while outsourcing cloud data. International Journal of Advance Research in Engineering, Science & Technology, 4(10), 126–129. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1788

Similar Articles

You may also start an advanced similarity search for this article.