Secured Authorized Data Using Hybrid Encryption in Cloud Computing

Abstract

In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.

Authors and Affiliations

Dinesh Shinde, Harsh Mathur

Keywords

Related Articles

Bijective Additive Singularity or Invertibility Preservers on Hermitian Matrices

Let M n be the set of all n x n complex matrices, and H n be all Hermitian matrices in M n .Suppose n  2 ,  is a bijective additive map on H n which maps the set of singular or invertible matrices into itself. Then th...

Lightweight Extensible Authentication Protocol Based Wireless Sensor Network

Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenceles...

Convection in a Maxwellian Viscoelastic Fluid Layer Through Porous Medium

The triply-diffusive convection in a Maxwellian viscoelastic fluid layer is mathematically investigated through porous medium. Following the linearized stability theory and normal mode analysis, the dispersion relation i...

An automated detection and classification approach in MRI tumor diagnosis

In the process of image coding, external noises impact a lot in processing efficiency. In the application of medical image processing, this effect is more, important due to its finer content details. It is required to mi...

Determination with Deep Learning and One Layer Neural Network for Image Processing in MultiSlice CT Angiogram

Today’s world Coronary artery disease is the most common cause of death worldwide and thus early diagnosis. Well-timed opportune of this disease can lead to significant reduction in its morbidityand mortality in both you...

Download PDF file
  • EP ID EP390244
  • DOI 10.9790/9622- 0702046471
  • Views 144
  • Downloads 0

How To Cite

Dinesh Shinde, Harsh Mathur (2017). Secured Authorized Data Using Hybrid Encryption in Cloud Computing. International Journal of engineering Research and Applications, 7(2), 64-71. https://europub.co.uk/articles/-A-390244