Ensure Hierarchal Identity Based Data Security in Cloud Environment

被引:50
作者
Kaushik, Shweta [1 ]
Gandhi, Charu [1 ]
机构
[1] JIIT Noida, Noida, India
关键词
Cloud Computing; Confidentiality; Decryption; Encryption; Hierarchal Structure; ID Based Cryptography (IBC); Satisfaction; Security; Signature; Trust; Verification; ENCRYPTION;
D O I
10.4018/IJCAC.2019100102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trustworthy, this resulted in the cloud data security demand. Today, many cloud service providers (CSPs) are using the asymmetric and public key cryptography (PKG) for authenticating and data security purposes using the digital identity of the user. To this end, this article focuses on cloud data storage and its delivery to authorized user. For this purpose, a hierarchal identity-based cryptography method is used for data security and checking the data integrity, in order to make sure that there is no alteration or modification done by a malicious attacker or CSP for its own benefit.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 31 条
[1]  
[Anonymous], 2004, IDENTITY BASED NONIN
[2]  
[Anonymous], 2011, NIST DEFINITION CLOU
[3]  
[Anonymous], HDB RES MODERN CRYPT
[4]  
[Anonymous], 2004, Guide to Elliptic Curve Cryptography, DOI DOI 10.1007/0-387-21846-73
[5]  
[Anonymous], ARXIV13047073
[6]  
Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
[7]  
Blake I. F., 2005, ADV ELLIPTIC CURVE C, DOI [10.1017/CBO9780511546570, DOI 10.1017/CBO9780511546570]
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Boneh D, 2008, LECT NOTES COMPUT SC, V5350, P455, DOI 10.1007/978-3-540-89255-7_28