A study on Identity Based Encryption Methods for Cloud Computing

2014 
Cloud computing has become the important platform to provide the infrastructure for computation, data storage, software services using the virtualization concept. These services are provided over internet, so security issue of data must be taken into consideration. Intruder can attack to access data or interrupt the communication. To prevent the attacks like man-in-the-middle attack, chosen plaintext, chosen cipher text, denial of services, need to implement number of techniques. The encryption through Public Key Infrastructure (PKI) using private key and public key is most known technique but the computational process, storage and certificate management effort to high and difficult for the Certificate Authority (CA). To reduce this effort and difficulties, the other technique is Identity Based Encryption (IBE) which reduces the overhead of Certificate Management and all other difficulties. IBE does the task easy to prevent communication against above attacks. In this paper, different schemes will be analyzed used against different attacks under the different strategies. To provide better key management, IBE uses the Private Key Generator (PKG), instead of CA, generates Private Key from the Identity of user. It uses the Hash Functions to provide better security.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    13
    References
    0
    Citations
    NaN
    KQI
    []