Wednesday, August 4, 2010

Development of a New Advance Encryption Scheme, a Potential Solution to Security Risk in Cloud Computing

In a joint development by NTT and Mitsubishi Electric Corporation, Mitsubishi Electric made an announcement on development of new Novel encryption technology addressing security risk in cloud computing paradigm. The new scheme is a fine-grained encryption capable of sophisticated and fine-grained data transmission and access control. The new scheme uses a mathematical approach known as “dual pairing vector spaces”.
In fine-grained encryption various parameters are added to the ciphertext and decryption key in the encryption-decryption logic, where attributes and predicates on them become the parameter of the ciphertext or decryption key.
The new scheme can be applied to variety of application due to its capability to be used in two distinct forms, one being, where the attributes become the parameter of the decryption key and predicates as that of ciphertext, and in the other form, attribute as the parameter of the ciphertext and predicates as that of decryption key. In the first form, the user will be able to decrypt and access the data using the decryption key when the attributes of the decryption key satisfy the pre-set predicates within the ciphertext, where application includes management of confidential information in companies, as well as personal information within database of public organizations. In the second form, data and attributes will be encrypted as a set and each user can only decrypt and read the data if the attributes of the encrypted data satisfy the predicate in the decryption key. Application for this form includes content distribution as well as database management in financial and medical fields. In case of content distribution the content providers will encrypt contents like animation, films with its attributes and place the encrypted contents in a cloud computing database. Base on this form user will be able to view the contents by decrypting it through use of decrypted key when the contents’ attributes satisfy the decryption key’s predicates

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More