Secure Data Sharing In Distributed Systems Using Identity Based Encryption

  • Unique Paper ID: 177928
  • PageNo: 2575-2580
  • Abstract:
  • Effective access control and revocation procedures are necessary for secure data sharing in cloud environments in order to safeguard private data. Using Revocable Storage Identity-Based Encryption (RS-IBE), this project suggests a safe framework for data sharing that guarantees user revocation, dynamic access control, and confidentiality. Four main components make up the system: the Data Provider, who forms a group and invites participants to share files; the Admin, who oversees system functions; the Key Generator, who generates and distributes file decryption keys; and the Data Users, who gain access to shared information. The Key Generator safely distributes the encryption key to authorized users upon file submission. To ensure that the revoked user can no longer access the data, the system immediately revokes access if a member is removed by the Data Provider. It does this by creating a new file key and distributing it exclusively to the remaining group members. This method guarantees smooth and safe data sharing in cloud storage environments, improves data confidentiality, and stops unwanted access. This method guarantees that sensitive files stay safe and does away with the necessity for complete re-encryption. The suggested approach is the perfect answer for safe and scalable cloud-based data sharing since it combines effective key management, access control systems, and dynamic user revocation. The solution is ideal for businesses that need to share data in a regulated and private manner since it improves data security, stops unwanted access, and lowers computational overhead.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{177928,
        author = {Renuga S and Lavanya K and Mrs.P.Sabeena Burvin and Dr.J.Hemalatha and Mr.C.Pravin Kumar},
        title = {Secure Data Sharing In Distributed Systems Using Identity Based Encryption},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {12},
        pages = {2575-2580},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=177928},
        abstract = {Effective access control and revocation procedures are necessary for secure data sharing in cloud environments in order to safeguard private data. Using Revocable Storage Identity-Based Encryption (RS-IBE), this project suggests a safe framework for data sharing that guarantees user revocation, dynamic access control, and confidentiality. Four main components make up the system: the Data Provider, who forms a group and invites participants to share files; the Admin, who oversees system functions; the Key Generator, who generates and distributes file decryption keys; and the Data Users, who gain access to shared information. The Key Generator safely distributes the encryption key to authorized users upon file submission. To ensure that the revoked user can no longer access the data, the system immediately revokes access if a member is removed by the Data Provider. It does this by creating a new file key and distributing it exclusively to the remaining group members. This method guarantees smooth and safe data sharing in cloud storage environments, improves data confidentiality, and stops unwanted access. This method guarantees that sensitive files stay safe and does away with the necessity for complete re-encryption. The suggested approach is the perfect answer for safe and scalable cloud-based data sharing since it combines effective key management, access control systems, and dynamic user revocation. The solution is ideal for businesses that need to share data in a regulated and private manner since it improves data security, stops unwanted access, and lowers computational overhead.},
        keywords = {Access control, Batch auditing, Cloud computing security, Cloud storage, Cryptographic verification, Data integrity, Data modification tracking, Data sharing, Digital signatures, Efficiency in cloud services, Proxy re-signatures, Public auditing, Shared data security, Third-party auditing, User revocation.},
        month = {May},
        }

Cite This Article

S, R., & K, L., & Burvin, M., & Dr.J.Hemalatha, , & Kumar, M. (2025). Secure Data Sharing In Distributed Systems Using Identity Based Encryption. International Journal of Innovative Research in Technology (IJIRT), 11(12), 2575–2580.

Related Articles