Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 2
Abstract
In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.
Authors and Affiliations
Dinesh Shinde, Harsh Mathur
Clustering Algorithms in Mobile Wireless Sensor Networks – A Survey
Mobile Wireless Sensor Network has grown tremendously and become a hot Research Area. The most important feature of Mobile Wireless Sensor Networks is that the sensor nodes are small devices with limited processing, low...
Use of Artificial Intelligence And Web Scraping Methods To Retrieve Information From The World Wide Web
The World Wide Web could represent a valid substitute for the traditional way of acquiring information. However, using this platform implies new challenges that are derived from the intrinsic nature of the information at...
Design and Analysis of Aluminum Alloy Wheel
Wheels are one of the most critical components in Automotive Engineering, As Fatigue prediction has been important issue in the design of aluminum alloy wheel. This work discuss the finite element techniques for simulati...
“Design and Analysis of a Windmill Blade in Windmill Electric Generation System”
Wind turbine is a standout amongst the most imperative wellsprings of renewable vitality. Wind turbine extricate active vitality from the wind. A little wind turbine cutting edge was composed and examined in this work. T...
A finite element study to compare the forces generated by a newly designed NITI file with an established rotary file
Aim: Aim of this study is to evaluate the lateral forces on the instrument in the apical 3rd of curved canal with two Nickel Titanium rotary systems. Methodology: One brand of instrument RaCe no 25 was scanned with micro...