Secured Authorized Data Using Hybrid Encryption in Cloud Computing

Abstract

In today’s world to provide a security to a public network like a cloud network is become a toughest task however more likely to reduce the cost at the time of providing security using cryptographic technique to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attributebased encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For to solution to all problems the cloud servers could tamper or replace the delegated cipher text and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution. There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.

Authors and Affiliations

Dinesh Shinde, Harsh Mathur

Keywords

Related Articles

Analysis of The Propulsion System Towards The Speed Reduction of Vessels Type PC-43

(PC-43) is an Indonesian navy vessel type limited patrol craft made in Indonesian. The vessel was designed using a steel material with a maximum speed of 27 knots and using engine power by 3 x 1800 HP, T = 1.40 at the em...

A Survey Paper on Issues in Wireless Sensor Network Applications

Wireless Sensor Networks square measure utilized in variety of fields which incorporates military, healthcare, environmental, biological, home and alternative industrial applications. With the massive advancement within...

Study on Temporal and Spatial Variation of PM2.5 on South Delhi

A high pollution level of PM2.5 particles is dangerous and harmful to human health as it causes deep penetration into the lungs. It can reach the alveolar region as well as have the potential to reduce the visibility of...

C.F.D. Analysis of Modern Cars: A Comparative Study

Aerodynamics is the science of how air flows around and inside objects. More generally, it can be labeled “Fluid Dynamics” because air is really just a very thin type of fluid. Above slow speeds, the air flow around and...

Characterization and Mechanical Properties of hybrid SiC+Al2O3 reinforced Al6061-T6 surface composite

Friction stir processing (FSP) was used for the fabrication of Al 6061 with SiC, Al2O3 nano composites for surface applications. The influence of rotational speed on mechanical properties of fabricated Aluminium alloy ba...

Download PDF file
  • EP ID EP390244
  • DOI 10.9790/9622- 0702046471
  • Views 113
  • Downloads 0

How To Cite

Dinesh Shinde, Harsh Mathur (2017). Secured Authorized Data Using Hybrid Encryption in Cloud Computing. International Journal of engineering Research and Applications, 7(2), 64-71. https://europub.co.uk/articles/-A-390244