Loading

Identity Based Proxy Reencryption with Null Deduplication for Secure Communication in Cloud Environment
Rashmi Dixit1, K. Ravindranath2

1Ms Rashmi Dixit, Research Scholar, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India.

2K. Ravindranath, Associate Professor, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India.

Manuscript received on 04 April 2019 | Revised Manuscript received on 11 April 2019 | Manuscript Published on 26 April 2019 | PP: 50-53 | Volume-8 Issue-6S April 2019 | Retrieval Number: F60200486S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud provide services in terms of infrastructure , software , and platform .But data becomes social as it resides on the cloud due which issue raises like security along integrity , duplication etc. The purpose of this work is to enhance the security of data stored on the cloud and improve the privacy along with integrity. Proxy-Reencryption Scheme based on identity is used. Data uploaded by data owner on the cloud is under control of cloud service provider, Data may be in motion or rest In this case for uploaded data needs of security and privacy is growing gradually. Attribute-based encryption (ABE) cater one and the other, access control as well as data security by specifying users with attributes so that particular user is able to decrypt data by matching attributes. In real-world applications of ABE, cancellation of users or their attributes is needed so that such users is no longer able decrypt the data. ABE is used in hybrid along with symmetric encryption scheme such as the Advanced Encryption Standard (AES). In this the data is encrypted with AES and the AES key is encrypted with ABE. Again Encryption performs on on ciphertext which is uploaded in the cloud, the data owner (DO) must requires more communication cost as well as computational burden as data download from the cloud, then decrypt, encrypt, and again upload the data back to the cloud.

Keywords: Deduplication, Attribute Based Encryption (ABE), Cloud Service Storage, Proxy Re-Encryption, Advanced Encryption Standard, AES.
Scope of the Article: Computer Science and Its Applications