Call For Paper Volume:4 Issue:10 Oct'2017 |

Privacy-Preserving Authentication through proxy re-encryption method in Cloud Computing

Publication Date : 31/03/2015



Author(s) :

DHIVYABHARATHI.S , Mr.T.K.P.RAJAGOPAL.


Volume/Issue :
Volume 2
,
Issue 3
(03 - 2015)



Abstract :

Cloud computing is emerging as a prevalent data interactive paradigm to realize user’s data remotely stored in an online cloud server.. A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a proxy re-encryption scheme that supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server.


No. of Downloads :

9


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

Privacy-Preserving Authentication through proxy re-encryption method in Cloud Computing

March 31, 2015