Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)

In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data s...

Full description

Saved in:
Bibliographic Details
Main Authors: B M, Chandrakala (Author), Lingareddy, S C (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-12-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02471 am a22003013u 4500
001 ijeecs18056_13181
042 |a dc 
100 1 0 |a B M, Chandrakala  |e author 
100 1 0 |e contributor 
700 1 0 |a Lingareddy, S C  |e author 
245 0 0 |a Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography) 
260 |b Institute of Advanced Engineering and Science,   |c 2019-12-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056 
520 |a In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm. 
540 |a Copyright (c) 2019 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Encryption, Re-Encryption, Proxy Re-Encryption 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 16, No 3: December 2019; 1455-1463 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v16.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056/13181 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056/13181  |z Get fulltext