Secured and Verifiable Approach for Attribute Based Encryption in Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 6
Abstract
Cloud Computing has changed the phenomena of IT industry completely. It allows access to highly scalable, inexpensive, on demand computing resources that can execute the code and store data that are provided. But adoption and approach to cloud computing applies only if the security is ensured. Cloud computing is lacking in security, confidentiality and visibility. Secure the cloud means to secure the storage. Security is achieved by the encryption. There are various encryption standards to ensure the cloud security. Attribute-based encryption (ABE) is public key encryption technique that allows users to encrypt and decrypt messages based on user attributes. In a typical implementation, the size of the cipher text is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. To reduce the decryption time in cloud outsourced decryption technique is used. By providing a transformation key to the cloud ABE cipher text is converted into simple cipher text and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext.. To ensure that transformation performed by cloud server is correct and the data is not modified by the untrusted servers proposed system is introduced. This provides secured and Verifiable Outsourced decryption.
Authors and Affiliations
Miss. Snehal Sunil Sancheti
Study Of Seismic Performance For Soft Basement Of RC
The building frame having infill panels with different materials, configuration and location has always subject of interest to researchers. Addition of infill’s may cause significant change in the dynamic characteristic...
Equilibrium and Kinetics of Glass Beads and Activated Carbon for Removal of Pb (II), Hg (II), and Cd (II) from Wastewater by Adsorption
The effect of partially replacing granular activated carbon (GAC) by glass beads (GB) in fixed bed for adsorption of Pb(II), Hg(II), and Cd(II) ions onto activated carbon were investigated. Experiments were carrie...
Mathematical Approaches For Computer Virus
This paper presents various aspects of mathematical approaches that are used to make analysis of computer viruses . The theory of functions ,logics and the automata theory helps to understand the replicati viruses with...
Outdoor MIMO Wireless Communications With Alamouti’s Space
Research on Alamouti’s space-time coding simplifying the transmission channel in a skill full manner. study the impact of MIMO-STBC .This paper described about channel capacity with pro STBC. In this paper we co...
Insights of Deep Web : What Google can’t search
This paper deals with the study of Deep Web that is a hidden unexplored part of internet. Further the characterstics and challenges of searching data in deep web are discussed along with the methods to access such...