Secured and Verifiable Approach for Attribute Based Encryption in Cloud Computing

Abstract

 Cloud Computing has changed the phenomena of IT industry completely. It allows access to highly scalable, inexpensive, on demand computing resources that can execute the code and store data that are provided. But adoption and approach to cloud computing applies only if the security is ensured. Cloud computing is lacking in security, confidentiality and visibility. Secure the cloud means to secure the storage. Security is achieved by the encryption. There are various encryption standards to ensure the cloud security. Attribute-based encryption (ABE) is public key encryption technique that allows users to encrypt and decrypt messages based on user attributes. In a typical implementation, the size of the cipher text is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. To reduce the decryption time in cloud outsourced decryption technique is used. By providing a transformation key to the cloud ABE cipher text is converted into simple cipher text and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext.. To ensure that transformation performed by cloud server is correct and the data is not modified by the untrusted servers proposed system is introduced. This provides secured and Verifiable Outsourced decryption.

Authors and Affiliations

Miss. Snehal Sunil Sancheti

Keywords

Related Articles

Design of Compensator of Approximation of Large Time Delay Systems via Reduced Order Model

The present paper deals with a approximating method for large time – delays of multi-input multi-output (MIMO) dynamical systems. Time delay terms of the state space equations are described by delay matrix in the compl...

 A Review on Adaptive Approach for Degraded Document Binarization

 This paper deals with an adaptive approach for binarization and enhancement of degraded documents. considerate the text from badly degraded document image is very difficult job due to high variations between the...

Document Storage And Retrieval System Protocols To Access Multimedia Data

Multimedia documents are complex accumulations of content portions that belong to different information types. Each information type needs dedicated tools that allow for generation, modification and presentation. The ob...

 Survey on Reactive Routing Protocols for Wireless Ad Hoc Networks

 Networks without fixed infrastructure are generally termed as Ad Hoc Networks. Ad Hoc Networks finds application in various areas including Military, Forestry where centralized base station is not feasible. Select...

REVIEW ON FORMULATION OF APPROXIMATE, GENERALIZED FIELD DATABASED MODEL AND ITS SIMULATION, OPTIMIZATION, RELIABILITY EVALUATION FOR SOME OPERATIONS OF MANUFACTURING ENTERPRISE

The present reviw is aimed at establishing mathematical relationship between the responses and inputs at some operation and formulating the field databased mathematical model for manufacturing...

Download PDF file
  • EP ID EP111576
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

Miss. Snehal Sunil Sancheti (30).  Secured and Verifiable Approach for Attribute Based Encryption in Cloud Computing. International Journal of Engineering Sciences & Research Technology, 3(6), 628-630. https://europub.co.uk/articles/-A-111576