Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. In ABE system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. However, it does not guarantee the correctness of the transformation done by the cloud. In the existing system, a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. In the proposed Categorical Heuristics on Attribute-based Encryption (CHAE) is an adaptation of Attribute Based Encryption (ABE) for the purposes of providing guarantees towards the provenance of the signed data, and moreover towards the anonymity of the signer. Finally, show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users
Authors and Affiliations
R. Brindha , R. Rajagopal
Implementation of E-mail Access for Vision Impaired Person Using Speech Synthesizer
Developments in technology over the last twenty years have enhanced the possibilities for learning and working for people with vision impairments. Computers with speech or Braille output peripherals, or portable speech-o...
Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
This paper presents the implementation of the high speed lifting-based two dimensional discrete wavelet transform (2D-DWT) algorithm on Field Programmable Gate Array (FPGA). Pipelining structure in DWT reduces hardware c...
An Effective Secure Mechanism for Vehicular Content Distribution in VANET
Vehicular Adhoc Networks (VANETs) facilitate vehicles to communicate with each other and with roadside units (RSUs). Content distribution for vehicular users through roadside Access Points (APs) has become an important r...
Performance Evaluation of VOIP over Multi Radio Multi channel Network
Wireless mesh network is an advanced form of wireless network. A wireless mesh network provides a better solution to problems that often arise in cellular and WLAN. Wireless mesh networks (WMNs) are receiving increasing...
A Tree of Life Approach for Multidimensional Data
With the recent exponential growth of ICT, there is explosive growth of data of varied nature. Human effort is always to efficiently store the data for the current and future usages. In the present day, we create data wi...