Rutambh Trivedi, Shyamsundar Kosbatwar


A Cloud computing is really a feasible way for sharing the data and its fast and reliable. It can be beneficial for both society and the users who are using that. But sometime it happens that user upload the data to the cloud server and it contains the very valuable information or private information. That’s why it is necessary to keep the track of the data and secure that by cryptographically,

Identity based encryption can be useful for develop the crypto graphical tool for this issue. Thus we cannot ensure that its will be static. Main issue is that the when the certain user’s authorization will expire than it should be removed from the Process, and also ensure that the user who is revoked cannot access the data that is previously shared. For maintaining this issue we are developing the recoverable storage identity based Encryption RSIBE, with giving cipher text and security of forward and backend user. In this user revocation will also include. The security model will also developed. When we compared our RSIBE it can be beneficial for the users in the areas of performance, functionality and efficiency and it can also be low in the cost. And then at the end we will provide the implementation results for comparing.


Cloud computing, Revocation, Cipher text, Security, Identity Based, Data Sharing

Full Text:



L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008.

K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A vision for socially motivated resource sharing,” Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551–563, 2012.

C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.

G. Anthes, “Security in the cloud,” Communications of the ACM, vol. 53, no. 11, pp. 16–18, 2010.

K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.

B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912.

S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2,

pp. 384–394, 2014.

C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 468–477, 2014.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.

D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586– 615, 2003.

W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” in Advances in Cryptology–CRYPTO 1998. Springer, 1998, pp. 137–152.

D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Advances in Cryptology– CRYPTO 2001. Springer, 2001, pp. 41–62.

C. Gentry, “Certificate-based encryption and the certificate revocation problem,” in Advances in Cryptology–EUROCRYPT 2003. Springer, 2003, pp. 272–293.

V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” in Financial Cryptography and Data Security. Springer, 2007, pp. 247–259.

A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proceedings of the 15th ACM conference on Computer and communications security. ACM, 2008, pp. 417–426.

B. Libert and D. Vergnaud, “Adaptive-id secure revocable identity-based encryption,” in Topics in Cryptology–CT-RSA 2009. Springer, 2009, pp. 1–15.

——, “Towards black-box accountable authority ibe with short cipher texts and private keys,” in Public Key Cryptography–PKC 2009. Springer, 2009, pp. 235–255.

J. Chen, H. W. Lim, S. Ling, H. Wang, and K. Nguyen, “Revocable identity-based encryption from lattices,” in Information Security and Privacy. Springer, 2012, pp. 390–403.

J. H. Seo and K. Emura, “Revocable identity-based encryption revisited: Security model and construction,” in Public-Key Cryptography–PKC 2013. Springer, 2013, pp. 216–234.

——, “Efficient delegation of key generation and revocation functionalities in identity-based encryption,” in Topics in Cryptology– CT-RSA 2013. Springer, 2013, pp. 343–358.

K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,” in Computer Security-ESORICS 2014. Springer, 2014, pp. 257–272.

D.-H. Phan, D. Pointcheval, S. F. Shahandashti, and M. Strefler, “Adaptive cca broadcast encryption with constant-size secret keys and cipher texts,” International journal of information security, vol. 12, no. 4, pp. 251–265, 2013.

M. Bellare and S. K. Miner, “A forward-secure digital signature scheme,” in Advances in Cryptology–CRYPTO 1999. Springer, 1999, pp. 431–448.

M. Abdalla and L. Reyzin, “A new forward-secure digital sig-nature scheme,” in Advances in Cryptology–ASIACRYPT 2000. Springer, 2000, pp. 116–129.

A. Kozlov and L. Reyzin, “Forward-secure signatures with fast key update,” in Security in communication Networks. Springer, 2003, pp. 241–256.

X. Boyen, H. Shacham, E. Shen, and B. Waters, “Forward-secure signatures with untrusted update,” in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006,pp. 191–200.

J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen, “Forward-secure identity-based signature: security notions and construction,” Information Sciences, vol. 181, no. 3, pp. 648–660, 2011.

R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” in Advances in Cryptology–Eurocrypt 2003. Springer, 2003, pp. 255–271.

D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya, “Id-based encryption for complex hierarchies with applications to forward security and broadcast encryption,” in Proceedings of the 11th ACM conference on Computer and communications security. ACM, 2004, pp.354–363.

J. M. G. Nieto, M. Manulis, and D. Sun, “Forward-secure hierarchical predicate encryption,” in Pairing-Based Cryptography–Pairing 2012. Springer, 2013, pp. 83–101.

A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and cipher text delegation for attribute-based encryption,” in Advances in Cryptology–CRYPTO 2012. Springer, 2012, pp. 199–217.

B. Waters, “Efficient identity-based encryption without random oracles,” in Advances in Cryptology–EUROCRYPT 2005. Springer, 2005, pp. 114–127.


S. Micali, “Efficient certificate revocation,” Tech. Rep., 1996.

B. Lynn. (2014) Pbc library: The pairing-based cryptography library.

Proceedings Papers:

X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, “Cost-effective authentic and anonymous data sharing with forward security,” Computers, IEEE Transactions on, 2014, doi: 10.1109/TC.2014.2315619.


  • There are currently no refbacks.

Comments on this article

View all comments

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.