Advertisement

A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique

  • AyodhyaRam Mohanthy
  • Jagadish Gurrala
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Cloud storage public services changed the way of the user access in the internet i.e. (1) Click (2) Download (3) Install (4) Use (time taking 4 steps) to click and use (time saving 2 steps). This easier accessibility for wider users lead to a threat of data confidentiality. Encrypting the data before uploading into public clouds is not possible all the times. So to provide the confidentiality of stored public cloud data, the encryption mechanism inside the cloud should be able to support the access of encrypted data. For balancing the security and efficiency we are proposing a public key encryption scheme for generating a secret key for both encryption and decryption using ASCII codes in the encrypting process.

Keywords

Secret key auditing protocol ASCII based encryption Group key generation Certificate-less authentication Cloud computing 

References

  1. 1.
    S. H. Seo, M. Nabeel, X. Ding and E. Bertino, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” in IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 9, pp. 2107–2119, Sept. 2014.Google Scholar
  2. 2.
    S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” in Proc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin, Germany: Springer, LNCS 2894, pp. 452–473.Google Scholar
  3. 3.
    J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute-based encryption,” in Proc. 2007 IEEE Symp. SP, Taormina, Italy, pp. 321–334.Google Scholar
  4. 4.
    D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities,” ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60–82, Feb. 2004.Google Scholar
  5. 5.
    J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer with access control,” in Proc. 16th ACM Conf. CCS, New York, NY, USA, 2009, pp. 131–140.Google Scholar
  6. 6.
    S. S. M. Chow, C. Boyd, and J. M. G. Nieto, “Security mediated certificate less cryptography,” in Proc. 9th Int. Conf. Theory Practice PKC, New York, NY, USA, 2006, pp. 508–524.Google Scholar
  7. 7.
    J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,” in Proc. EUROCRYPT, Berlin, Germany, 2008. pp. 146–162.Google Scholar
  8. 8.
    X. W. Lei Xu and X. Zhang, “CL-PKE: A certificate less proxy re-encryption scheme for secure data sharing with public cloud,” in ACM Symp. Inform. Comput. Commun. Security, 2012.Google Scholar
  9. 9.
    B. Lynn. Pairing-based cryptography [Online]. Available: http://crypto.stanford.edu/pbc.
  10. 10.
    T. Dillon, C. Wu and E. Chang, “Cloud computing: issues and challenges,” 24th IEEE International Conference on Advanced Information Networking and Applications, AINA, pp. 27–33, Apr. 2010.Google Scholar
  11. 11.
    Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y, “Fine-grained data access control systems with user accountability in cloud computing,” IEEE second international conference on cloud computing technology and science(CloudCom) 2010, pp. 89–96.Google Scholar
  12. 12.
    eung-Hyun Seo and Xiaoyu Ding, “An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds”, IEEE Transactions On Knowledge and Data Engineering, Vol. 26, No. 9, September 2014.Google Scholar
  13. 13.
    S. Al-Riyami and K. Paterson, “Certificate less public key cryptography,” in Proc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin, Germany: Springer, LNCS 2894, pp. 452–473.Google Scholar
  14. 14.
    Y. Sun, F. Zhang, and J. Baek, “Strongly secure certificate less public key encryption without pairing,” in Proc. 6th Int. Conf. CANS, Singapore, 2007, pp. 194–208.Google Scholar
  15. 15.
    Smitha Sundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud” March 2012.Google Scholar
  16. 16.
    P. Sanyasi, Naidu, J. Gurrala “Investigation and analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices”, published in IJCA,Volume 146/Number 8 (ISBN: 973-93-80893-84-7, July2016, pp. 12–17.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Computer Science and TechnologyDepartment of Computer Science and Engineering, ANIL Neerukonda Institute of Technology and Sciences (ANITS)VisakhapatnamIndia

Personalised recommendations