Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 2
Abstract
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.
Authors and Affiliations
Dinesh Shinde, Harsh Mathur
A Methodical Study Of Web Crawler
World Wide Web (or simply web) is a massive, wealthy, preferable, effortlessly available and appropriate source of information and its users are increasing very swiftly now a day. To salvage information from web, search...
Optimization of Suitable Electrolyte for High Emittance coating on Titanium Alloy
Titanium and it's alloys are used in the aerospace industry due to its light weigh, strength and ability to withstand extreme temperatures. Also titanium is as strong as Steel but much lighter, it is twice as strong as a...
New DNA Based Dynamical S-Box for Block Cipher
DNA based technique has grown rapidly among researchers in introducing the latest network security algorithms, which can enhance the strength of the current cryptosystem. DNA-based techniques are able to provide a high d...
Determination with Deep Learning and One Layer Neural Network for Image Processing in MultiSlice CT Angiogram
Today’s world Coronary artery disease is the most common cause of death worldwide and thus early diagnosis. Well-timed opportune of this disease can lead to significant reduction in its morbidityand mortality in both you...
Role of Social Media in Healthcare Domain: An Integrated Review
The ever increasing role of social media now-a-days in people’s life created newer avenues for research in almost every domain. In the field of healthcare, social media and user-generated content are opening more opportu...