Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing

被引:0
|
作者
Gunjal, Yogita S. [1 ]
Gunjal, Mahesh S. [1 ]
Tambe, Avinash R. [2 ]
机构
[1] Amrutvahini Coll Engn, Dept Comp Engn, Sangamner, Maharashtra, India
[2] Amrutvahini Coll Engn, Dept Elect & Telecommun Engn, Sangamner, Maharashtra, India
关键词
Cipher-text-policy attribute-based encryption (CP-ABE); hybrid encryption; user authorization; circuits; multi-linear map; Dual Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most centralized systems allow data access to its cloud user if a cloud user has a certain set of satisfying attributes. Presently, one method to compete such policies is to use an authorized cloud server to maintain the user data and have access control over it. At times, when one of the servers keeping data is compromised, the security of the user data is compromised. For getting access control, maintaining data security and obtaining precise computing results, the data owners have to keep attribute-based security to encrypt the stored data. During the delegation of data on cloud, the cloud servers may be tampered by the counterfeit cipher-text. Furthermore, the authorized users may be cheated by retorting them that they are unauthorized. Largely the encryption control access attribute policies are complex. In this paper, we present Cipher-text Policy Attribute-Based Encryption for maintaining complex access control over encrypted data with verifiable customizable authorization. The proposed technique provides data confidentiality to the encrypted data even if the storage server is comprised. Moreover, our method is highly secured against collusion attacks. In advance, performance evaluation of the proposed system is elaborated with implementation of the same.
引用
收藏
页码:187 / 190
页数:4
相关论文
共 50 条
  • [21] BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification
    Li, Peiyao
    Cao, Heyang
    Wang, Mingsheng
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [22] Massive Data Hybrid Encryption Algorithm Based on Cloud Computing
    Yang, Ersong
    You, Lin
    Wu, Zhendong
    Yu, Wangke
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1864 - 1867
  • [23] Homomorphic Cloud Computing Scheme Based on Hybrid Homomorphic Encryption
    Song, Xidan
    Wang, Yulin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2450 - 2453
  • [24] Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing
    Aravinth, S. S.
    Ramkumar, M.
    Rajkumar, B.
    Anitha, M.
    Elangodi, S.
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 110 - 113
  • [25] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19
  • [26] A Hybrid Two Layer Attribute Based Encryption for Privacy Preserving in Public Cloud
    Verma, Shiva
    Ahuja, Sachin
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 174 - 178
  • [27] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Yu, Ping
    Wen, Qiaoyan
    Ni, Wei
    Li, Wenmin
    Sun, Caijun
    Zhang, Hua
    Jin, Zhengping
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 719 - 738
  • [28] Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System
    Ping Yu
    Qiaoyan Wen
    Wei Ni
    Wenmin Li
    Caijun Sun
    Hua Zhang
    Zhengping Jin
    Wireless Personal Communications, 2019, 106 : 719 - 738
  • [29] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [30] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105