Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 2
Abstract
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.
Authors and Affiliations
Dinesh Shinde, Harsh Mathur
Study Of Mechanical Properties Of LM-4 Reinforcement With Zro2 For Structural Application
Composite materials are engineered or naturally occurring materials made from two or more constituent materials with significantly different physical or chemical properties which remain separate and distinct within the f...
Gravity Lamp
In recent times due to effects of pollution and global warming there is a need for generating power from renewable sources. The reason for generating power using gravity is that it is available all over the Earth, abunda...
Influence of alkaline earth modifiers on luminescence characteristics of Dy3+ ions in lead zinc antimonate glasses
Sb2O3–PbO –ZnO: Dy2O3 glasses mixed with three different modifier oxides viz., BaO, CaO and SrO were prepared. The influence of modifier oxide on the luminescence characteristics of Dy3+ ions has been investigated. Using...
Globalization Effect of Mining in India and Rajasthan
Globalization is the tendency of investment funds and businesses to move beyond domestic and national markets to other markets around the globe, thereby increasing the interconnection of the world. Mining resources are a...
Synthesis and photoluminescence studies of polymer capped SnO2 nanoparticles synthesized by chemical co-precipitation method
In recent years many research works have been focused on the electrical and optical properties of metal oxides. In this present paper SnO2 nanoparticles have been synthesized by chemical co-precipitation method using dif...