An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

2019 ◽  
Vol 23 (24) ◽  
pp. 13127-13138 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Sarita Gajbhiye Meshram ◽  
Muhammad Khurram Khan
2020 ◽  
Vol 33 (7) ◽  
pp. e4307 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Cheng-Chi Lee ◽  
Abhay S. Ranadive ◽  
Chun-Ta Li ◽  
Sarita Gajbhiye Meshram ◽  
...  

2021 ◽  
Vol 118 ◽  
pp. 102185
Author(s):  
Bowen Liu ◽  
Shunmei Meng ◽  
Xutong Jiang ◽  
Xiaolong Xu ◽  
Lianyong Qi ◽  
...  

2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2013 ◽  
Vol 756-759 ◽  
pp. 837-840 ◽  
Author(s):  
Sheng Chang Guo ◽  
Yi Liu ◽  
Jie Ling

This paper draws on the principle of identity-based public key encryption (IBE) system algorithm. A suitable Identity authentication scheme for cloud computing environment is proposed. Security analysis of the scheme is given. The proposed scheme using the bidirectional signature between Client and cloud server has solved the safety verification audit, and realized identity authentication in cloud computing. We provide end-to-end authentication instead of trusted third party, which solve the problem of Key Escrow and improve the efficiency of the management of the identity authentication.


Sign in / Sign up

Export Citation Format

Share Document