Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. In ABE system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. However, it does not guarantee the correctness of the transformation done by the cloud. In the existing system, a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. In the proposed Categorical Heuristics on Attribute-based Encryption (CHAE) is an adaptation of Attribute Based Encryption (ABE) for the purposes of providing guarantees towards the provenance of the signed data, and moreover towards the anonymity of the signer. Finally, show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users
Authors and Affiliations
R. Brindha , R. Rajagopal
Improved Discretization Based Decision Tree for Continuous Attributes
The majority of the Machine Learning and Data Mining applications can easily be applicable only on discrete features. However, data in solid world are sometimes continuous by nature. Even for algorithms that will directl...
Query Based Expert Search Based on Relevance Class and Web Page Quality Ranking
Expert search is mostly used in the areas of academic groups, organizations. The general expert search problem which is observed is searching experts on the web where lot of web pages and experts names are considered. It...
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...
An Evaluation Agent System for Enhancing Wikipedia Management
Wikipedia has recently become a popular platform for knowledge sharing and creation. However, the enormously increasing amount of editing has caused management problems with efficiency, accuracy, and convenience for Wiki...
Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can be communicated with each other wirelessly without the need to any existed communications. Mobile Ad hoc Network (MANET) consists of a group of m...