Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. In ABE system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. However, it does not guarantee the correctness of the transformation done by the cloud. In the existing system, a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. In the proposed Categorical Heuristics on Attribute-based Encryption (CHAE) is an adaptation of Attribute Based Encryption (ABE) for the purposes of providing guarantees towards the provenance of the signed data, and moreover towards the anonymity of the signer. Finally, show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users
Authors and Affiliations
R. Brindha , R. Rajagopal
Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach
Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse d...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...
A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching For Video Retrieval
Recently, in the field of video analysis and retrieval Human action recognition in video is an important research and challenging topic. An efficient video retrieval is needed to search most similar and relevant video co...
Different Type of Feature Selection for Text Classification
Text categorization is the task of deciding whether a document belongs to a set of pre specified classes of documents. Automatic classification schemes can greatly facilitate the process of categorization. Categorization...
Survey on Security Issues and Solutions in Cloud Computing
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Clou...