SlideShare a Scribd company logo
A Seminar Presentation
On
An Efficient Certificate-less Encryption
for
Secure Data Sharing in Public Clouds
Seminar by :-
Abhijeet S. Patil
Contents
 Introduction
 Scope
 Objective
 Literature Review and Proposed system
 Motivational Outcome
 System Architecture
 Implementation Details
 Existing Algorithm
 Selected Algorithm
 Application and Results
 Conclusion
 References
Introduction
Cloud Computing
• Cloud Computing is the delivery of
computing services over the Internet.
• Types of Cloud Computing
• Private Cloud
• Public Cloud
• Hybrid Cloud
• Community Cloud
• Organizations have been adopting public
cloud services such as Microsoft Skydrive,
Dropbox, Google Drive to manage their
data with the help of Cloud Computing
Encryption and Decryption
• Encryption
• The data owner obtains the key of
users from the cloud. Then data
owner encrypts the data using the
public key of user.
• Types of Encryption
Symmetric Key Encryption
Public key Encryption
• Decryption
• When a user wants to read some data,
it sends a request to the Sender to
obtain the partially decrypted data.
• With the help of private key he
decrypts the data and access it.
Scope of Proposed System
 Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem
in identity based encryption and certificate revocation problem in public key
cryptography.
 Since most CL-PKC schemes are based on bilinear pairings, they are computationally
expensive.
 Our scheme reduces the computational overhead by using a pairing-free approach.
 Compared to symmetric key based mechanisms, our approach can efficiently manage keys
and user revocations.
Objective of Seminar
 Existing Machine Objective :-
 Existing mCL-PKE schemes are either inefficient because of the use of expensive
pairing operations or vulnerable against partial decryption attacks.
 Seminar Objective & Scope :-
 Attribute Based Encryption(ABE) has been proposed that allows one to encrypt
each data item based on the access control policy applicable to the data.
Literature Review
and
Proposed system
Motivational Outcome
 Implementation of a mCL-PKE scheme and evaluation of its security to provide a
confidentiality of the data stored in an untrusted cloud improve the efficiency of
encryption at the data owner.
 The confidentiality of the content and the keys is preserved with respect to the
cloud, because the cloud cannot fully decrypt the information results show that
our schemes are efficient and practical
System Architecture
Implementation Details
Existing Algorithm
 Certificateless public key cryptography (CL-PKC)
 Ciphertext-Policy Attribute-Based Encryption
 Relations Among Notions of Security for Public-Key Encryption Schemes
 RSA trapdoor Encryption
 Fuzzy Identity-Based Encryption
 A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
Selected Algorithm
 SetUp
 SetPrivateKey
 SetPublicKey
 Encrypt
 USER-Decrypt
Implementation Details
Applications and Results
 mCL-PKE scheme is applied to construct a practical solution to the problem of sharing
sensitive information in public clouds.
 The confidentiality of the content and the keys is preserved with respect to the
cloud.
 Result shows that the scheme system implemented is effective, efficient and
practical.
 Data retrieval, Data encryption and Data decryption strategy
Conclusion
In this seminar, it is proposed the first CL-PKE scheme without pairing operations and provided
its formal security. So, here In public key systems supporting queries on encrypted data a
secret key can produce tokens for testing any supported query predicate. We presented a
general framework for analyzing security of searching on encrypted data systems. The mCL-
PKE solves the key escrow problem and revocation problem
Thank you…!!!!!!

More Related Content

What's hot (20)

DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan
 
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Nexgen Technology
 
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shakas Technologies
 
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
PDF
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer
 
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
swathi78
 
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
Sravan Narra
 
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Sanjana Yemajala
 
PDF
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
DOCX
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
DOCX
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PPTX
Privacy preserving public auditing
vmshimavm
 
DOCX
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
PPTX
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Nexgen Technology
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shakas Technologies
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
swathi78
 
key aggregate cryptosystem for scalable data sharing in cloud
Sravan Narra
 
Key aggregate cryptosystem for scalable data sharing in cloud
Meka Subramanyam
 
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Sanjana Yemajala
 
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Privacy preserving public auditing
vmshimavm
 
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 

Viewers also liked (10)

PPTX
Final 1st
gokulprema
 
PPTX
School of Scholars,Amravati
sosamravati
 
PDF
Infographic why to choose infernal innovations magnetic phone mount
Infernal Innovations
 
PDF
Time to say goodbye to transactional HR chores
Neeyamo Inc.
 
PDF
OPM Mock Decision
opmeag
 
PPT
Master management and textile engineering placement facts
Paola Fini
 
PPTX
5 s
becetintas
 
DOCX
Fieldsymbols
Ashish Mohapatra
 
PPT
Xen Installation Presentation
Abhijeet Patil
 
PDF
Script details
Ashish Mohapatra
 
Final 1st
gokulprema
 
School of Scholars,Amravati
sosamravati
 
Infographic why to choose infernal innovations magnetic phone mount
Infernal Innovations
 
Time to say goodbye to transactional HR chores
Neeyamo Inc.
 
OPM Mock Decision
opmeag
 
Master management and textile engineering placement facts
Paola Fini
 
Fieldsymbols
Ashish Mohapatra
 
Xen Installation Presentation
Abhijeet Patil
 
Script details
Ashish Mohapatra
 
Ad

Similar to An efficient certificateless encryption for data sharing on public cloud (20)

PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
PDF
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
IJCSIS Research Publications
 
PDF
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
 
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
PDF
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
PDF
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
 
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
PDF
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
PDF
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
 
PDF
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
PDF
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
PPTX
Achieving Secure And Scalable Cloud computing
Kiran Girase
 
PDF
Paper id 27201446
IJRAT
 
PDF
F018133640.key aggregate paper
IOSR Journals
 
PDF
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
PDF
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
 
PDF
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
IJCSIS Research Publications
 
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
ijsrd.com
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
 
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
Achieving Secure And Scalable Cloud computing
Kiran Girase
 
Paper id 27201446
IJRAT
 
F018133640.key aggregate paper
IOSR Journals
 
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
 
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
Design Thinking basics for Engineers.pdf
CMR University
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Day2 B2 Best.pptx
helenjenefa1
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 

An efficient certificateless encryption for data sharing on public cloud

  • 1. A Seminar Presentation On An Efficient Certificate-less Encryption for Secure Data Sharing in Public Clouds Seminar by :- Abhijeet S. Patil
  • 2. Contents  Introduction  Scope  Objective  Literature Review and Proposed system  Motivational Outcome  System Architecture  Implementation Details  Existing Algorithm  Selected Algorithm  Application and Results  Conclusion  References
  • 4. Cloud Computing • Cloud Computing is the delivery of computing services over the Internet. • Types of Cloud Computing • Private Cloud • Public Cloud • Hybrid Cloud • Community Cloud • Organizations have been adopting public cloud services such as Microsoft Skydrive, Dropbox, Google Drive to manage their data with the help of Cloud Computing
  • 5. Encryption and Decryption • Encryption • The data owner obtains the key of users from the cloud. Then data owner encrypts the data using the public key of user. • Types of Encryption Symmetric Key Encryption Public key Encryption • Decryption • When a user wants to read some data, it sends a request to the Sender to obtain the partially decrypted data. • With the help of private key he decrypts the data and access it.
  • 6. Scope of Proposed System  Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography.  Since most CL-PKC schemes are based on bilinear pairings, they are computationally expensive.  Our scheme reduces the computational overhead by using a pairing-free approach.  Compared to symmetric key based mechanisms, our approach can efficiently manage keys and user revocations.
  • 7. Objective of Seminar  Existing Machine Objective :-  Existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks.  Seminar Objective & Scope :-  Attribute Based Encryption(ABE) has been proposed that allows one to encrypt each data item based on the access control policy applicable to the data.
  • 9. Motivational Outcome  Implementation of a mCL-PKE scheme and evaluation of its security to provide a confidentiality of the data stored in an untrusted cloud improve the efficiency of encryption at the data owner.  The confidentiality of the content and the keys is preserved with respect to the cloud, because the cloud cannot fully decrypt the information results show that our schemes are efficient and practical
  • 12. Existing Algorithm  Certificateless public key cryptography (CL-PKC)  Ciphertext-Policy Attribute-Based Encryption  Relations Among Notions of Security for Public-Key Encryption Schemes  RSA trapdoor Encryption  Fuzzy Identity-Based Encryption  A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
  • 13. Selected Algorithm  SetUp  SetPrivateKey  SetPublicKey  Encrypt  USER-Decrypt
  • 15. Applications and Results  mCL-PKE scheme is applied to construct a practical solution to the problem of sharing sensitive information in public clouds.  The confidentiality of the content and the keys is preserved with respect to the cloud.  Result shows that the scheme system implemented is effective, efficient and practical.  Data retrieval, Data encryption and Data decryption strategy
  • 16. Conclusion In this seminar, it is proposed the first CL-PKE scheme without pairing operations and provided its formal security. So, here In public key systems supporting queries on encrypted data a secret key can produce tokens for testing any supported query predicate. We presented a general framework for analyzing security of searching on encrypted data systems. The mCL- PKE solves the key escrow problem and revocation problem