CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework


Explosive growth in the amount of passwords for web based applications and encryption keys for outsourced information storage well exceeds the management limit of users. Thus, outsourcing keys (including passwords and knowledge encryption keys) to skilled password managers (honest-however-curious service suppliers) is attracting the eye of many users. However, existing solutions in a very traditional information outsourcing scenario are unable to simultaneously meet the following 3 security requirements for keys outsourcing: 1) Confidentiality and privacy of keys; a pair of) Search privacy on identity attributes tied to keys; 3) Owner controllable authorization over his/her shared keys. In this paper, we propose CloudKeyBank, the first unified key management framework that addresses all the 3 goals higher than. Under our framework, the key owner will perform privacy and controllable authorization enforced encryption with minimum info leakage. To implement CloudKeyBank efficiently, we have a tendency to propose a brand new cryptographic primitive named Searchable Conditional Proxy Re-Encryption (SC-PRE) that combines the techniques of Hidden Vector Encryption (HVE) and Proxy Re-Encryption (PRE) seamlessly, and propose a concrete SC-PRE scheme based on existing HVE and PRE schemes. Our experimental results and security analysis show the efficiency and security goals are well achieved.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in Indian privacy law and information security, is information
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : Network Resource Allocation for Users With Multiple Connections Fairness and Stability - 2014 ABSTRACT: This paper studies network resource allocation between users that manage multiple connections, possibly
PROJECT TITLE : Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks - 2014 ABSTRACT: This paper considers the problem of joint topologytransparent scheduling (TTS) and quality-of-service (QoS) routing in
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry