IJSRP, Volume 7, Issue 12, December 2017 Edition [ISSN 2250-3153]
Anshul Garg and Rachna Jain
Cloud computing is an emerging and promising technique for allowing users to handle and access data from remote locations. However, with the technology getting matured, the users’ privacy and the security of user’s statistical information is progressively challenged. The traditional centralized access control scheme uses a symmetric key approach and does not support validation. We aim to illustrate the vital issues of identity revocation in this paper. Here we introduce the concept of an instance of outsourcing computation into Identity-Based Encryption (IBE) which trails to a revocable IBE scheme in the server-aided0 setting. Most of the key generation related operations during key-update and key-issuing processes are removed with this scheme, leaving only an invariant number of elementary operations for Public Key Generation (PKG).