A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context

  • Authors

    • Amish Singh
    • Saurabh Shukla
    • Sowmiya B
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10462
  • Pre-Authentication, Proxy Re-encryption, Identity-based encryption(IBE), Ciphertext.
  • This survey paper categorizes, compares, andsummarizes the algorithms, data sets and performance measurement in the published articles related to proxy re-encryption and medical systems. Most of the systems either deploy a pre-authentication approach or a proxy re-encryption approach, they are seldom seen together. Most of the systems either take a patient -centric or a doctor-centric approach whereas the demand is for a common system that can be accessible to all access groups. Multi-data sharing is another concept that is necessary to be implemented in the newer systems and is lacking in many of them .The proposed system overcomes all these problems . It uses RSA for the pre authentication and AES algorithm to to perform pre authentication.

  • References

    1. [1] K. R. M. Li, S. Yu and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settingsâ€, Security and Privacy in Communication Networks, International ICST Conference, SECURECOMM, pp. 89–106, 2010.

      [2] E. H. J. Benaloh, M. Chase and K. Lauter, “Patient controlled encryption: Ensuring privacy of electronic medical records†ACM Cloud Computing Security Workshop, pp. 103–114, 2009.

      [3] H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, “A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks†IEEE Transaction on Parallel and Distributed Systems, vol. 25, no. 1, pp. 22–32, Jan 2014.

      [4] M.Green and G.Ateniese, “Identity-based proxy re-encryption†Applied Cryptography and Network Security, vol. 4521, pp. 288–306, 2007.

      [5] W. S. K. Liang and J. Liu, “Privacy-preserving ciphertext multi-sharing control for big data storage†IEEE Transaction on Information Forensics and Security, vol. 10, no. 8, Aug 2015.

      [6] K. B. G. Ateniese and S. Hohenberger, “Key-private proxy re-encryptionâ€Topics in Cryptology- CT- RSA (Lecture Notes in Computer Science), vol. 5473, pp. 279–294, 2009.

      [7] S.H.R. Canetti and J.Katz, “Chosen-ciphertext security from identity-based encryption†Advances in Cryptology-EUROCRYPT,pp. 207–222, 2004.

      [8] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

      [9] T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networksâ€, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.

  • Downloads

  • How to Cite

    Singh, A., Shukla, S., & B, S. (2018). A comprehensive survey of pre-authentication approach towards proxy re-encryption in cloud data context. International Journal of Engineering & Technology, 7(2.8), 358-360. https://doi.org/10.14419/ijet.v7i2.8.10462