Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 5 , 2022
Verifiable Mechanism for Attribute Based Encryption in Cloud Computing

Author : S.Boominathan 1 Dr. S.Aranganathan 2

Date of Publication :7th March 2016

Abstract: Cloud computing technology brings innovative computing facilities to the management of the data resources. In the computing environments, the cloud servers can offer various data services such as remote data storage, outsourced delegation, computing applications. sharing and retrieving the data are ensure with Ciphertext Policy- Attribute Based Encryption (CPABE), Verifiable Delegation (VD) which helps in data isolation and the verifiability of entrustment on fraudulent cloud servers. In the cloud, for achieve access control and trust data top secret, the data owners could take up attribute-based encryption to encrypt the stored data. During the encryption process the access policies may not be flexible enough. The proposed secure outsourced ABE technique addresses on key issuing and Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) ElGamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user.

Reference :

    1. Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE Transactions On Information Forensics And Security, Vol. 8, No. 8, August 2013.
    2. J. Bethencourt, A. Sahai and B. Waters, “Ciphertext-Policy Attribute-Based Encryption”, Proceedings of IEEE Security and Privacy, (2007), Oakland
    3. G. Wang, Q. Liu and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services”, Proceedings of the 17th ACM conference on Computer and communicationssecurity, (2010), Chicago, USA.
    4. R. Bobba, H. Khurana and M. Prabhakaran, “Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption”, Proceedings of the 14th European conference on Research in computer security, (2009), Heidelberg.
    5. G. Wang, Q. Liu, J. Wu and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, Vol. 30, Issue 5, (2011) July, pp. 320–331.
    6. S. Muller, S. Katzenbeisser and C. Eckert, “Distributed Attribute-Based Encryption”, in International Conference on Information Security and Cryptology, (2008) December 3-5, Seoul, Korea.
    7. S. Yu, C. Wang, K. Ren and W. Lou, “Attribute Based Data Sharing with Attribute Revocation”, 5th ACM Symposium on Information, Computer and Communications Security, (2010) April 13 – 16, Beijing, China.
    8. G. Wang, Q. Liu and J. Wu, “Hierarchical attributebased encryption for fine-grained access control in cloud storage services”, Proceedings of the 17th ACM conference on Computer and communications security, (2010) October 4-8, New York, USA.
    9. P. Rohini, “Data Security Technique in cloud storage”, IJCST, Vol. 4, (2013), pp. 1

Recent Article