A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique

被引:0
作者
Mohanthy, AyodhyaRam [1 ]
Gurrala, Jagadish [1 ]
机构
[1] ANITS, Comp Sci & Technol, Dept Comp Sci & Engn, Visakhapatnam, Andhra Prades, India
来源
COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY | 2017年 / 5卷
关键词
Secret key auditing protocol; ASCII based encryption; Group key generation; Certificate-less authentication; Cloud computing; CRYPTOGRAPHY;
D O I
10.1007/978-981-10-3226-4_34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud storage public services changed the way of the user access in the internet i.e. (1) Click (2) Download (3) Install (4) Use (time taking 4 steps) to click and use (time saving 2 steps). This easier accessibility for wider users lead to a threat of data confidentiality. Encrypting the data before uploading into public clouds is not possible all the times. So to provide the confidentiality of stored public cloud data, the encryption mechanism inside the cloud should be able to support the access of encrypted data. For balancing the security and efficiency we are proposing a public key encryption scheme for generating a secret key for both encryption and decryption using ASCII codes in the encrypting process.
引用
收藏
页码:337 / 345
页数:9
相关论文
共 15 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Boneh D., 2004, ACM T INTERNET TECHN, V4, P60
[4]  
Camenisch J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P131
[5]  
Chow SSM, 2006, LECT NOTES COMPUT SC, V3958, P508
[6]   Cloud Computing: Issues and Challenges [J].
Dillon, Tharam ;
Wu, Chen ;
Chang, Elizabeth .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :27-33
[7]  
Jin Li, 2010, Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom 2010), P89, DOI 10.1109/CloudCom.2010.44
[8]  
Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
[9]  
Lei Xu X.W., 2012, ACM S INF COMP COMM
[10]  
Lynn B., PAIRING BASED CRYPTO