Survey on Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Authors

  • Shruti Kirti Dixit, Dr. Tripti Arjariya

Keywords:

Identity-based encryption (IBE), revocation, outsourcing, cloud computing

Abstract

In this research work, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. In this paper many research papers are surveyed related to the Identity-Based Encryption with Outsourced Revocation in Cloud Computing. In this present a security enhanced construction under the recently formalized Refereed Delegation of Computation (RDoC) model.

References

Li, Jin, et al. "Identity-based encryption with outsourced revocation in cloud computing." IEEE Transactions on Computers, vol. 64, no. 2, 2015, pp. 425–437.

Wang, Cong, et al. "Privacy-assured outsourcing of image reconstruction service in cloud." IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, 2013, pp. 166–177.

Li, Jin, et al. "Fine-grained access control system based on outsourced attribute-based encryption." European Symposium on Research in Computer Security. Springer, Berlin, Heidelberg, 2013.

Li, Jingwei, et al. "Outsourcing encryption of attribute-based encryption with MapReduce." International Conference on Information and Communications Security. Springer, Berlin, Heidelberg, 2012.

Benjamin, David, and Mikhail J. Atallah. "Private and cheating-free outsourcing of algebraic computations." Privacy, Security and Trust, 2008. PST'08. Sixth Annual Conference on. IEEE, 2008.

Wang, Cong, Kui Ren, and Jia Wang. "Secure and practical outsourcing of linear programming in cloud computing." INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.

Zhou, Zhibin, and Dijiang Huang. "Efficient and secure data storage operations for mobile cloud computing." Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, 2012.

Green, Matthew, Susan Hohenberger, and Brent Waters. "Outsourcing the decryption of ABE ciphertexts." USENIX Security Symposium, vol. 2011, no. 3, 2011.

S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations,” in Proc. 2nd Int. Conf. Theory of Cryptography (TCC’05), 2005, pp. 264–282.

Thilakanathan, Danan, et al. "Secure data sharing in the Cloud." Security, Privacy and Trust in Cloud Systems. Springer, Berlin, Heidelberg, 2014, pp. 45–72.

Downloads

How to Cite

Shruti Kirti Dixit, Dr. Tripti Arjariya. (2025). Survey on Identity-Based Encryption with Outsourced Revocation in Cloud Computing. International Journal of Research & Technology, 6(1), 12–15. Retrieved from https://ijrt.org/j/article/view/51

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.