Revocable Identity-Based Broadcast using Cloud Computing

C. H. Srinivasa Reddy*, B. Venkateswara Rao**, G. Krishna Karthik***
*-*** Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, Andhra Pradesh, India.
Periodicity:September - November'2021
DOI : https://doi.org/10.26634/jit.10.4.17350

Abstract

Distributed computing refers to the practise of connecting several computer servers through a network to share data and coordinate processing. A "distributed system" is the name given to such a cluster. scalability, performance, robustness, and cost-effectiveness are all benefits of distributed computing. Distributed computing provides a flexible and useful path for information exchange, with several benefits for both the general public and individuals. In some case, there is a widespread resistance among customers to transfer properly common information to the cloud server since the information usually contains sensitive information. Along these lines, it's critical to strengthen cryptographically accessed control over mutual data. Identity-based encryption (IBE) is a cryptographically basic method of building a suitable information-sharing framework.

Keywords

Proxy Re-Encryption, Cloud Data Sharing, Broadcast Encryption, Revocation.

How to Cite this Article?

Reddy, C. H. S., Rao, B. V., and Karthik, G. K. (2021). Revocable Identity-Based Broadcast using Cloud Computing. i-manager’s Journal on Information Technology, 10(4), 17-24. https://doi.org/10.26634/jit.10.4.17350

References

[1]. Bhagyashri, S., & Gurav, Y. B. (2014). Privacy-preserving public auditing for secure cloud storage. IOSR Journal of Computer Engineering (IOSR-JCE), 16(4), 33-38. https:// doi.org/10.9790/0661-16433338
[2]. Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586-615. https://doi.org/10.1137/S009 7539701398521
[3]. Efficient Certificate Revocation. (n.d.). Retrieved from https://patents.google.com/patent/US6487658
[4]. Frankenfield, J. (2021). Cloud Computing. Retrieved from https://www.investopedia.com/terms/c/cloudcomputing. asp
[5]. Ge, C., Susilo, W., Wang, J., & Fang, L. (2017). Identitybased conditional proxy re-encryption with fine grain policy. Computer Standards & Interfaces, 52, 1-9. https:// doi.org/10.1016/j.csi.2016.12.005
[6]. Shamir, A. (1985). Identity-Based Cryptosystems and Signature Schemes. The Weizmann Institute of Science Rehovot, Israel, (pp. 47-53).
[7]. Susilo, W., Chen, R., Guo, F., Yang, G., Mu, Y., & Chow, Y. W. (2016, May). Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (pp. 201-210). https://doi.org/ 10.1145/2897845.2897848
[8]. Techfunnel. (2021). 14 Incredible Benefits of Cloud Computing for Businesses. Retrieved from https://www. techfunnel.com/information-technology/benefits-ofcloud- computing/
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.