<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Biometric-Based Encryption Method for Secure Data Sharing in Cloud Environment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gauraangi Praakash</string-name>
          <email>gauraangi.praakash@s.amity.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pooja Khanna</string-name>
          <email>pkhanna@lko.amity.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sachin Kumar</string-name>
          <email>skumar3@lko.amity.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pragya</string-name>
          <email>dr.pragya2011@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Amity University Uttar Pradesh</institution>
          ,
          <addr-line>Lucknow Campus</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>MVD College, University of Lucknow</institution>
          ,
          <addr-line>Lucknow</addr-line>
        </aff>
      </contrib-group>
      <fpage>11</fpage>
      <lpage>20</lpage>
      <abstract>
        <p>When seen from the point of view of information collecting, distributed storage can very easily be converted into a decision-making approach. In a short amount of time, data storage evolves into a technique of preference. Since data is protected remotely rather than locally, consumers from both the home and the technical sphere are inclined to do so. If the dispersed storage is not completely confident, it means that users have "the possibility to incorporate knowledge about the online cloud." Regardless of whether customers find cloud-based information to be a major cause for concern, the fact remains that it can be a difficult problem, especially because we trade data on cloud servers. To address this issue in a competent and effective manner, the Revocable IBE conspires, and the primary refreshing technique are both already available. In addition, cloud architecture experience needs to be improved to enable the utilization of contemporary safe information structures in distributed computing. In this sense, a figure (or any encoded document) can contain a temporary amount of time. If the characteristics of the figurative content fit the configuration of the key, and if all possible occurrences are permitted to take place, then the figurative content must be decrypted. After a client has specified an end time, the information is permanently removed from the cloud server in a secure manner. The framework proposed is equipped with features such as unfailing viability for both PKG measures and client shared secret key size because of the utilization of the key updating service that is made available by the cloud server, further the time comparison establishes that proposed technique with GSP is more efficient as compared to without GSP. Results show that the proposed system with GSP reduces processing time by approximately 0.001 times.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Cloud Computing</kwd>
        <kwd>Privacy Preservation</kwd>
        <kwd>Bio-metric</kwd>
        <kwd>Identity Based Encryption (IBE)</kwd>
        <kwd>SelfDestruction</kwd>
        <kwd>Revocation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The most generally acknowledged example of distributed computing is the use of specialized
properties or hardware that reside on re-bit computers as administration and is transferred on to the end
user, with the internet being the most accepted example. Fame and significance are easily acquired by
distributed storage. To safely exchange information, the identity-based encoding strategy or the use of
identity mixes is used [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. A remarkable cornerstone of cryptography is Identity Based Encryption. It's
a kind of transparent key encryption where customers are a key to the personality of a customer (e.g.,
the email address of a customer) because there are certain special specifics about it. To enter the general
population criteria of this scheme, a sender must be able to encrypt a message using the contents
measurement of the recipient's email address. The beneficiary collects her scrambling key from a
specialist who can be trusted because he manufactures mystery keys for every client. It offers every
conference an opportunity to enjoy the perceived character and an open key. The Private Key Generator
is a trusting outsider's private key [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
        ] The PKG key not only maintains the proportional ace private
key but also disseminates an ace open key for the programmed to run. Every participant will be able to
calculate an open key that is somewhat near to the personality ID if they enter the ace open key alongside
the character respect given by the ace open key. The PKG, which utilizes the ace encryption key to
render the private key for character ID, relates to the meeting that approved using the character ID to
receive a coordinating private key. This allows the PKG to render the private key for personality ID.
For security purposes, whether a client exits the meeting or acts poorly, he or she must be expelled from
the gathering. This disavowed customer should then never have the right to get to and alter exchanged
information again. A. Boldyreva, et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] a revocable Identity Based Encryption scheme has been
proposed, but it has the drawback of requiring calculation at a single level, i.e., an administrator or
important individual from the organization. An estimation of outsourcing into IBE renunciation has
been offered as a means of addressing this problem. Framework suggests a way for dumping all key
era- related forms that must be completed between the key-issuing and key-refreshing processes. This
would leave PKG and eligible clients with only a few straightforward activities to carry out locally.
Another technique for the issuance of safe keys is suggested, and this one uses a half-breed private key
for each customer. In addition, an AND gate is incorporated into the process of determining the key's
age, and this gate is directed especially to the personality component and the time segment.
      </p>
      <p>Similarly, in distributed computing, a stable information self-destructing system is proposed to
increase distributed storage space. Each ciphertext in this structure is named with a time between value,
so the private key is associated with a duration moment. The moment and the ciphertext will follow the
key will be extracted if both the time characters and its related characters are present in the dictionary.
In general, the owner has the authority to determine whether specific confidential data is valid for a
given duration, i.e., whether it self-destructs at the end of a time span specified by the owner, or whether
it cannot be released before a specific deadline.</p>
    </sec>
    <sec id="sec-2">
      <title>2. RELATED WORK</title>
      <p>
        The creator proposes a fully realistic encryption plot based on personalities in this paper [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] (IBE).
In the arbitrary prophet display, the structure has chosen ciphertext defense, anticipating the
DiffieHellman problem in a different computational form. The framework concentrates on logarithmic
mapping linking the groups. Weil's fusion with elliptical curves is a consequence of this kind of
principle. An alternative Concept of an open key encryption is introduced by the author in study
presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] called as Identity based encryption. It is more efficient and popular as it does not require
the standard public key infrastructure for key management. Any environment, whether based on PKI or
personality, must provide a way for customers to leave the system. Capable disavowal is a frequently
discussed topic in the standard PKI environment.
      </p>
      <p>On the other hand, there hasn't been much work done in the IBE environment to concentrate on the
components of denial. When scrambling, the arrangement that is the most grounded demands that
senders continue to employ eras and that collectors routinely update respective encryption information
by meeting with a reliable specialist. In any event, this setup does not scale very well; when the number
of users increases, the function upon that main page becomes a bottleneck, and the configuration does
not scale very well. We propose a conspiracy including the IBE that would considerably increase the
suitability of key-refresh in favor of the stock that is placed in collection while continuing to retain the
capability of supplying the customers.</p>
      <p>
        Our structure has been shown to be secure, and it is derived from the ideas behind the information
structure of the primitive and double trees used in the fuzzy IBE. The author of [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] focused on a variant
of Identity-Based Encryption (IBE) that is referred to as Fuzzy Based Identity Encryption. Within the
framework of Fuzzy IBE, a lifestyle is characterized by a collection of illustrative characteristics. A
private key is used in a Fuzzy IBE arrangement to transcribe a figure material along with an
identification for an identity, Providing, and only providing, that the characters are! In addition,
according to the results of the partition measure known as "set cover," 0 and 0 are the same.
      </p>
      <p>
        What precisely considers air conditioning number is a characteristic of a Fuzzy IBE plan referred to
as its screw- up resistance. The usage of biometric identities, which will be permanently disrupted each
time they are evaluated; the "mess up resistance property" of the Fuzzy IBE plan is simply what
considers the air conditioning number as a factor. the utilization of biometric identities, which will
invariably result in the production of some sort of disturbance each time that they are evaluated; the
defect tolerance characteristic of a fuzzy IBE plan is precisely what takes into consideration air
conditioning number [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref20 ref21">17-21</xref>
        ]. The utilization of several types of biometric IDs as required in addition,
we show how the Fuzzy-IBE algorithm can be used for "quality-based encryption," which is a concept
that we define.
      </p>
      <p>
        The creator tackles the dilemma of using untrusted (conceivably harmful) cryptographic
accomplices in this paper [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Here, to ensure the privacy of the data outsourced over cloud, a structured
mechanism has been proposed. In this model, the organized state of the will shapes the item for the
accomplice, but as the contraption begins to depend on it, there is no synchronization correspondence
with it. Not only does it offer a process for calculating adequacy and testing the potential of an
outsourcing use, but it also provides a mechanism for measuring the adequacy. It also involves two
simple stable outsourcing deals. It demonstrates how to outsource computed exponentiation, which is
the technological limitation in most open encryption algorithms on computationally limited computers,
in a secure manner. A computer will require O (n) special increases if it is to complete exponentiation
frame bit types if it does not make use of outsourcing. Any exponentiation-based scheme in which the
authentic contraption can employ two untrusted exponentiation programs as measurements, and with
which use the Cramer-Shoup cryptographic algorithm and Schnor checks causes the pile to decrease to
O (log2 n). Using an untrusted Cramer-Shoup encryption program, we achieve a comparable weight
reduction for a simple going considered security for another CCA2-secure encryption arrangement.
      </p>
      <p>
        As shown by the author in this paper [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], attribute-based encryption (ABE) is a promising
cryptographic standard instrument for fine-grained access control. However, in current ABE schemes,
the computational approach to online encryption often results in a one-sided life of access course of
action, which translates into an obstacle to its use. In this article, a novel approach for outsourcing ABE
encryption to a cloud organization provider is proposed to reduce the awkwardness of group
computation. It makes use of an improved Map. Reduce cloud advancement by ensuring that at least
one of the slave center points is visible from the master center point and, moreover. After outsourcing,
the customer will experience an accurate numerical loss that is decreased from the initial loss of four
exponentiations during the encryption process to a hazy four exponentiations. Another potential
drawback of the change that is being suggested is that the customer may opt to encrypt each action.
      </p>
      <p>The migration of data from a company's local servers to those hosted in the cloud can be
accomplished with the help of cloud-based data clients. The result of this is that the consumer is relieved
of the cost of maintenance while also receiving data storage facilities of a high grade. The use of cloud
storage creates a lot of privacy and safety concerns. Both the companies that supply cloud services and
the servers that store data have some shortcomings. Concerns have been raised by the customer over
the integrity of the data that has been uploaded to cloud storage. In this piece, the public key hash
algorithm is utilized. In addition, for data dynamics, this makes it easier to do dynamic operations such
as inserting new data, updating existing data, removing old data, and altering blocks.</p>
      <p>
        The Merkle Hash Tree [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is a tool that is utilized to help in the process of finding the position of
each complex operation. A third-party examiner validates the accuracy of the user's data and attests to
the reliability of the information that is kept on the cloud server. There is a significant reduction in the
amount of computational and communication overhead. The defragmentation method is utilized to
ascertain whether the file in question already resides on the cloud server before the user uploads it to
the cloud storage location of their choice. This solution is robust and secure, even when faced with
malicious server-launched replace attacks.
      </p>
      <p>
        According to the author of this paper [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], ABE is an insight into future architecture that has mostly
been associated with application fine-grained access control systems. However, as the numerical
expense rises due to the multifaceted nature of the get-to recipe, ABE's high scheme over-head is being
scrutinized. Since they have forced the figuring of assets, this problem has proven to be more genuine
for portable de- indecencies. It demonstrates a general and capable approach for integrating a
qualitybased access management framework into ABE by introducing secure outsourcing strategies to achieve
the aforementioned goal. More specifically, two cloud specialist co-ops (CSPs) have been created,
namely the key age cloud specialist co-op (KG-CSP) and the decryption cloud specialist co-op
(DCSP), to handle outsourced key- issuing and unscrambling independently for the benefit of trait
specialists and consumers.
      </p>
      <p>
        In author in study [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], presented the automated formulation of cryptographic system for forward
security. Mystery keys are refreshed on a regular basis; contact with a mystery key coordinating to a
specific day and age does not allow a challenger in a forward-secure schedule to "kill" some previous
period's strategy. Forward-secure advanced label plans, key-trade conventions, and symmetric-key
plans have all seen developments. Under the definitive bilinear assumption of Diffie-Hellman, the
primary building achieves security close to chosen plaintext attacks in the standard model. This
structure is intuitive, and as the total number of eras grows, all parameters evolve in a logarithmic
fashion.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. IMPLEMENTATION DETAILS</title>
      <p>With recent development in storage and technical advancements, cloud computing has stepped in as
universal solution with features like colossal size data storage, bulky calculation, low-value benefit, and
adaptable approach to get to the data. Concept is based on ide of virtualization. Virtualization is targeted
to incorporate set of virtual assets or devices like storage gadget, server, organize or working system
where the structure partitions the space into sectors to match the exact number of execution conditions
that are required. Cloud computing is a powerful technique to for management of storage issues and
insides of its administration, model suggested provides the data owner the capability to outsource and
keep files saved at cloud platform. Number of organizations and subscribers have started employing
cloud storage as reliable and easy to access source for facilitating data administration, processing, and
storage, though concerns of security and privacy do exist. One of the primary concerns is whether the
data stored in reliable manner and will not go missing in cloud facility.</p>
      <p>Issues related whether organizations managing cloud facility meets data safety requirement of the
client is a major concern. Concerns altogether make it vital and important to increase the confidence of
data owners on cloud facility. Diversified models exist for securing and processing of data for public
domain model and private domain model. Generally, with Private domain model, the owner of the data
can establish the fidelity of the outsourced data that is being managed and stored at the cloud facility.</p>
      <p>
        In this technique, the owner of the outsourced data is supposed to have expertise. One more major
concern happens to be integrity and authenticity of the security mechanism taking care of steps related
to accessing the data. Numerous methods exist for key generation, traditional mechanism employed for
encryption is not enough for countering the attack techniques deployed by the unauthorized users and
attackers. For aforementioned reasons an encryption technique based on user feature can be a efficient
method for enhancing security. Technique offers a unique key based on a user feature; this technique
can make the data access very secured but there is definitely there is scope for error if not security.
Further an innovative solution could be to employ hybrid technique of a feature-based mechanism in
tandem with user biometric data i.e. fingerprint, iris, face features etc. to improvise the system and
secure the data access with unauthorized access nearly impossible. Employing to much in-between steps
on the security concerns and including the resolution for the minutest detail may lead to the degradation
in the efficiency of the system. Therefore, a balance is to be maintained for improving the security
measures and efficiency acceptable. [
        <xref ref-type="bibr" rid="ref22 ref23 ref24">22-25</xref>
        ]
      </p>
      <p>The proposed architecture and implementation details of the system has been discussed in this
section. Following figure 1 shows the schematic representation of the proposed system.</p>
      <p>A. System Overview</p>
      <p>
        The client builds an account on the cloud and then logs in to frameworks using a correct username
and password. User demands KU-CSP keys [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] after signing in. The client / proprietor uses the keys to
scratch the documents and move them to the cloud server over a fixed period, all while being completely
weightless. The remaining client is then sent to the KU-CSP, which creates a new key or refreshes the
old ones in order to keep the device secure and passes the new keys to the client's key. The residual
consumer is reshaped at this stage. When the predefined document cycle on the cloud server is complete,
the report will be lost to the server and will no longer be available to clients. The computing space of
the cloud system is expanded as a result of this. To overcome the disadvantage of the previous
framework, the framework genius postures information self-destruction strategy. The literature review
shows that the existing mechanism retains the data as it is over the cloud storage, even if it is no longer
in use. It makes the users, remove the data manually to free the space. Thus increasing the workload of
the user and simultaneously occupying the storage unnecessarily over the cloud storage. Thus, to
overcome these issues from the existing system, our proposed system has the mechanism to
automatically destroy the data once either the time duration to access the data is over or the data is no
longer needed. We call this feature as self-data destruction mechanism. Here, the information is
transmitted to the cloud server for a set period (for example, (2/2/2023-3/2/2023,). Here, in this example
the data outsourced over cloud will be accessible to the authorized user only for the specified time frame
of a day. Once the permissible time frame is over, the system will revoke the accessibility and destroy
the data from the server. It will ensure the security of the data from unauthorized access also it will free
the space from the server.
      </p>
      <p>B. Data Self-Destructing Mechanism</p>
      <p>A Self-Destructing Scheme known as key-strategy personality-based encryption collaborates with
time-defined characteristics, which is based on the review that each identification thing can be linked
to an arrangement of properties in suitable cloud application circumstances, and each attribute is linked
to a time interval detail, demonstrating that the encrypted data thing can be deciphered between those
periods. Each user's key is linked to a get-to tree, and each leaf hub is linked to a period during which
the data owner scrambles his or her information before distributing the device to customers. Since the
get to tree's simple articulation can mean any desired information index for it, it can obtain fine- grained
get to command at any time between each of the. The ciphertext cannot be decoded if the time moments
are not within the predefined time intermediate, i.e., the ciphertext will be naturally lost and no one
would be able to unscramble it due to the secure key closure. Along these lines, it is possible to achieve
a secure self-pulverization of data with fine-grained control. The essential characteristics should satisfy
the get to tree, where even the time span of each leaf in the key customers should have a place in the
ciphertext with the coordinating characteristic, keeping in mind the goal of effectively unscrambling
the ciphertext.</p>
      <p>Group
of</p>
      <p>User
Update
Key</p>
      <p>KU-CSP
Revocation</p>
      <p>Self</p>
      <p>Destructing Scheme
File
Upload</p>
      <p>File
Download</p>
      <p>PKG
Based on
identity
File</p>
      <p>Encrypted File</p>
      <p>Network Cloud
Decrypted File
Private
Key</p>
      <p>PKG
Outsource</p>
      <p>Key
C. Experimental Setup</p>
      <p>The IDE tool for the development of the system is NetBeans 8.1 and JDK 1.8 were included in the
system as a front end on the Windows level. The program can be run on any regular computer. The
system would not have to think about running a specific machinery.</p>
    </sec>
    <sec id="sec-4">
      <title>4. ALGORITHM FORMULATION</title>
      <p>In a short amount of time, data storage evolves into a technique of preference. Since data is protected
remotely rather than locally, consumers from both the home and the technical sphere are inclined to do
so. If the dispersed storage is not completely confident, it means that users have "the possibility to
incorporate knowledge about the online cloud."
Regardless of whether customers find cloud-based information to be a major cause for concern, the
fact remains that it can be a difficult problem, especially because we trade data on cloud servers.
Assume S represents the system where.</p>
      <p>S = {Φ, KDC, CS}
Table 1
Algorithm – Biometric based Encryption
i. User
Φ = {Ṝ, £, ¥, €, δ} Where,
Ṝ= User Registration
£= User Login
¥= Request for Key
€= Encryption of
Data δ= User</p>
      <sec id="sec-4-1">
        <title>Revocation</title>
        <p>ii. Key Distribution Centre KDC= {α, β}</p>
      </sec>
      <sec id="sec-4-2">
        <title>Generating set of Keys</title>
        <p>α= {α1, α2, α3 ... αn}</p>
      </sec>
      <sec id="sec-4-3">
        <title>Where α represents the set of public keys. β= {β1, β2, β3 ... βn}</title>
      </sec>
      <sec id="sec-4-4">
        <title>Where β represents the set of private keys generated with respect</title>
        <p>to the public key.
iii. Cloud Server is CS: {U, D} ;</p>
        <p>D: {F, T}
where</p>
      </sec>
      <sec id="sec-4-5">
        <title>U: File to be Uploaded</title>
      </sec>
      <sec id="sec-4-6">
        <title>D: the process of self-destruction</title>
      </sec>
      <sec id="sec-4-7">
        <title>F: Number of files</title>
        <p>T: Time Interval</p>
        <p>To address this issue in a competent and effective manner, the Revocable IBE conspires, and the
primary refreshing technique are both already available. In addition, cloud architecture experience
needs to be improved to enable the utilization of contemporary safe information structures in distributed
computing. In this sense, a figure (or any encoded document) can contain a temporary amount of time.
If the characteristics of the figurative content fit the configuration of the key, and if all possible
occurrences are permitted to take place, then the figurative content must be decrypted. After a client
has specified an end time, the information is permanently removed from the cloud server in a secure
mannerAn Example of equation.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. RESULT &amp; DISCUSSION</title>
      <p>The graph illustrates the difference between some of the system's storage space and the proposed
storage space, the system has been unable to retrieve the data from the public cloud, but the constructed
methodology will delete the data from the public cloud after a stated amount of time, minimizing the
cloud server's storage space. The various files on the cloud server are shown in the x-axis, while the
storage in the y-axis is stored in mb.</p>
      <p>Figure 3 and 4 shows the comparison of space and time complexity of the system implemented with
and without dedicated key distribution server. From the graph, implementation of dedicated key
generation server reduces the complexity and make the system more efficient.</p>
    </sec>
    <sec id="sec-6">
      <title>6. CONCLUSION</title>
      <p>The rapid expansion of flexible cloud administration has resulted in the emergence of several
previously unanticipated issues. One of the most significant challenges is figuring out how to securely
remove information that has been outsourced and stored in the cloud. This paper proposed an
information self-destructing mechanism that can achieve the time defined ciphertext in distributed
computing to resolve the issues. This mechanism would resolve the issues by performing an adaptable
wonderful get to control between the consent specified time and moment self-decimation after coming
close to shared and outsourced information. IBE is also familiar with the catch-22 situation that arises
when a character is repudiated by an estimate that can be revocably outsourced. There is no need for a
safe channel or client verification during the key updating process that takes place between the client
and the KU-CSP. In addition, the framework is equipped with features such as unfailing viability for
both PKG measures and client shared secret key size because of the utilization of the key updating
service that is made available by the cloud server, further the time comparison establishes that
proposed technique with GSP is more efficient as compared to without GSP. The framework proposed
is equipped with features such as unfailing viability for both PKG measures and client shared secret
key size because of the utilization of the key updating service that is made available by the cloud
server, further the time comparison establishes that proposed technique with GSP is more efficient as
compared to without GSP. Results show that the proposed system with GSP reduces processing time
by approximately 0.001 times.</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
      <p>Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316.</p>
      <p>Springer, Singapore. https://doi.org/10.1007/978-981-19-5403-0_12
[25] S. Priya, G. Srivastava and S. Kumar, "Blockchain Integrated Crowdfunding Platform for
Enhanced Secure Transactions," 2021 4th International Conference on Recent Developments in
Control, Automation &amp; Power Engineering (RDCAPE), Noida, India, 2021, pp. 280-285,
doi: 10.1109/RDCAPE52977.2021.9633380.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Jin</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Jingwei</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Xiaofeng</given-names>
            <surname>Chen</surname>
          </string-name>
          , Chunfu Jia, and Wenjing Lou, “
          <article-title>Identity-Based Encryption with Outsourced Revocation in Cloud Computing”</article-title>
          ,
          <source>in IEEE transactions on computers</source>
          , vol.
          <volume>64</volume>
          , no.
          <issue>2</issue>
          ,
          <string-name>
            <surname>february</surname>
          </string-name>
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W.</given-names>
            <surname>Aiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lodha</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Ostrovsky</surname>
          </string-name>
          , “
          <article-title>Fast digital identity revocation,”</article-title>
          <source>In Advances in Cryptology CRYPTO98)</source>
          . New York, NY, USA:Springer,
          <year>1998</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Boldyreva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Goyal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , “
          <article-title>Identity-based encryption with efficient revocation,”</article-title>
          <source>in Proc. 15thACMConf. Comput. Commun.Security (CCS08)</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>417</fpage>
          -
          <lpage>426</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Boneh</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Franklin</surname>
          </string-name>
          , “
          <article-title>Identity-based encryp-tion from the Weilpairing,” in Advances in Cryptology CRYPTO „</article-title>
          <year>01</year>
          ), J. Kilian, Ed.Berlin, Germany: Springer,
          <year>2001</year>
          , vol.
          <volume>2139</volume>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>229</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sahai</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Waters</surname>
          </string-name>
          , “
          <article-title>Fuzzy identity-based encryption,”in Advances in Cryptology (EUROCRYPT‟05)</article-title>
          , R. Cramer, Ed. Berlin, Germany: Springer,
          <year>2005</year>
          , vol.
          <volume>3494</volume>
          , pp.
          <fpage>557</fpage>
          -
          <lpage>557</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and X.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Outsourcing encryp-tion of attribute based encryption with mapreduce,” in Information and Communications Security</article-title>
          . Berlin, Heidel-berg:Springer,
          <year>2012</year>
          , vol.
          <volume>7618</volume>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ren</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Privacy-assured Trans</article-title>
          .
          <source>Emerging Topics Comput.</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>166</fpage>
          -
          <lpage>177</lpage>
          , Jul. Dec.
          <article-title>2013 outsourcing of image reconstruction service in cloud</article-title>
          ,” IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R. Patil</given-names>
            <surname>Rashmi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gandhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sarmalkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pund</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Khetani</surname>
          </string-name>
          ,
          <article-title>"RDPC: Secure Cloud Storage with Deduplication Technique," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)</article-title>
          , Palladam, India,
          <year>2020</year>
          , pp.
          <fpage>1280</fpage>
          -
          <lpage>1283</lpage>
          , doi: 10.1109/ISMAC49090.
          <year>2020</year>
          .
          <volume>9243442</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jia</surname>
          </string-name>
          , J. Ma, and W. Lou, “
          <article-title>Fine-grained access control system based on outsourced attribute-based encryption</article-title>
          ,”
          <source>in Proc. 18th Eur. Symp. Res. Comput. Secu-rity (ESORICS)</source>
          ,
          <year>2013</year>
          ,pp.
          <fpage>592</fpage>
          -
          <lpage>609</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Canetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Halevi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Katz</surname>
          </string-name>
          , “
          <article-title>A forward-secure publickey Encryption scheme,” in Advances in Cryptology (EUROCRYPT'03</article-title>
          ), E. Biham, Ed. Berlin, Germany: Springer,
          <year>2003</year>
          , vol.
          <volume>2656</volume>
          ,pp.
          <fpage>646</fpage>
          -
          <lpage>646</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Mell</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Grance</surname>
          </string-name>
          , “
          <source>The NIST Definition of Cloud Computing,” Nat. Inst</source>
          . Stand. Technol.,
          <source>Tech. Rep. SP 800 - 145</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ren</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Secure and practical outsourcing of linear programming in cloud computing,”</article-title>
          <source>in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>820</fpage>
          -
          <lpage>828</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Green</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hohenberger</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Waters</surname>
          </string-name>
          , “
          <article-title>Outsourcing the decryption of ABE ciphertexts,”</article-title>
          <source>in Proc. 20th USENIX Conf. Security (SEC‟11)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hanaoka</surname>
          </string-name>
          , G. Hanaoka,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shikata</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Imai</surname>
          </string-name>
          ,
          <article-title>Identity-based hierarchical strongly keyinsulated encryption and its application, in Advances in Cryptology (ASIACRYPT05), B</article-title>
          . Roy, Ed. Berlin, Germany: Springer,
          <year>2005</year>
          , vol.
          <volume>3788</volume>
          , pp.
          <fpage>495</fpage>
          <lpage>514</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Boneh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ding</surname>
          </string-name>
          , G. Tsudik, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <article-title>A method for fast revocation of public key certificates and security capabilities</article-title>
          ,
          <source>in Proc. 10th USENIX Security Symp.</source>
          ,
          <year>2001</year>
          , pp.
          <fpage>297308</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>Libert</surname>
          </string-name>
          and
          <string-name>
            <surname>J.-J. Quisquater</surname>
          </string-name>
          ,
          <article-title>Efficient revocation and threshold pairing based cryptosystems</article-title>
          ,
          <source>in Proc. 22nd Annu. Symp. Principles Distrib. Comput.</source>
          ,
          <year>2003</year>
          , pp.
          <fpage>163171</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>"How to design space efficient revocable IBE from non-monotonic ABE"</article-title>
          ,
          <source>Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS'11)</source>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>385</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Boneh</surname>
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Boyen</surname>
            <given-names>X.</given-names>
          </string-name>
          <article-title>Efficient selective-id secure identity-based encryption without random oracles Advances in Cryptology (EUROCRYPT'04</article-title>
          )
          <string-name>
            <surname>Cachin</surname>
            <given-names>C.</given-names>
          </string-name>
          , and Camenisch J., Eds., Berlin, Germany: Springer,
          <year>2004</year>
          , vol.
          <volume>3027</volume>
          , pp.
          <fpage>223</fpage>
          -
          <lpage>238</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Boneh</surname>
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Boyen</surname>
            <given-names>X.</given-names>
          </string-name>
          <article-title>Secure identity based encryption without random oracles Advances in Cryptology (CRYPTO'04</article-title>
          )
          <string-name>
            <surname>Franklin</surname>
            <given-names>M.</given-names>
          </string-name>
          , Ed., Berlin, Germany: Springer,
          <year>2004</year>
          , vol.
          <volume>3152</volume>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Waters</surname>
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Efficient</surname>
          </string-name>
          identity
          <article-title>-based encryption without random oracles Advances in Cryptology (EUROCRYPT'05</article-title>
          )
          <string-name>
            <surname>Cramer</surname>
            <given-names>R</given-names>
          </string-name>
          ., Ed., Berlin, Germany: Springer,
          <year>2005</year>
          , vol.
          <volume>3494</volume>
          , pp.
          <fpage>114</fpage>
          -
          <lpage>127</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Khanna</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>"Communication Architecture for Vehicular Ad Hoc Networks, with Blockchain Security," 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai</article-title>
          , United Arab Emirates,
          <year>2020</year>
          , pp.
          <fpage>68</fpage>
          -
          <lpage>72</lpage>
          , doi: 10.1109/ICCAKM46823.
          <year>2020</year>
          .
          <volume>9051499</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khanna</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A Hybrid Blockchain-Secured Elderly Healthcare Environment</article-title>
          . In: Tanwar,
          <string-name>
            <surname>S</surname>
          </string-name>
          . (eds)
          <article-title>Blockchain for 5G-Enabled IoT</article-title>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -67490-8_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Kumud</surname>
            <given-names>Tiwari</given-names>
          </string-name>
          , Sachin Kumar, Pooja Khanna, Anil Kumar,
          <article-title>"Blockchain-based transaction validation for patient interoperability in Healthcare 4.0", Blockchain Applications for Healthcare Informatics</article-title>
          , Academic Press,
          <year>2022</year>
          , Pages 1-
          <fpage>26</fpage>
          , ISBN 9780323906159, https://doi.org/10.1016/B978-0
          <source>-323-90615-9</source>
          .
          <fpage>00017</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khanna</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pragya</surname>
            , Tripathi,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Biometric Assisted Multi-modal Encryption Key for Secured FHSS Communication</article-title>
          . In: Bhattacharyya,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.S.</given-names>
            ,
            <surname>Köppen</surname>
          </string-name>
          , M. (eds)
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>