Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing

被引:0
|
作者
Gunjal, Yogita S. [1 ]
Gunjal, Mahesh S. [1 ]
Tambe, Avinash R. [2 ]
机构
[1] Amrutvahini Coll Engn, Dept Comp Engn, Sangamner, Maharashtra, India
[2] Amrutvahini Coll Engn, Dept Elect & Telecommun Engn, Sangamner, Maharashtra, India
关键词
Cipher-text-policy attribute-based encryption (CP-ABE); hybrid encryption; user authorization; circuits; multi-linear map; Dual Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most centralized systems allow data access to its cloud user if a cloud user has a certain set of satisfying attributes. Presently, one method to compete such policies is to use an authorized cloud server to maintain the user data and have access control over it. At times, when one of the servers keeping data is compromised, the security of the user data is compromised. For getting access control, maintaining data security and obtaining precise computing results, the data owners have to keep attribute-based security to encrypt the stored data. During the delegation of data on cloud, the cloud servers may be tampered by the counterfeit cipher-text. Furthermore, the authorized users may be cheated by retorting them that they are unauthorized. Largely the encryption control access attribute policies are complex. In this paper, we present Cipher-text Policy Attribute-Based Encryption for maintaining complex access control over encrypted data with verifiable customizable authorization. The proposed technique provides data confidentiality to the encrypted data even if the storage server is comprised. Moreover, our method is highly secured against collusion attacks. In advance, performance evaluation of the proposed system is elaborated with implementation of the same.
引用
收藏
页码:187 / 190
页数:4
相关论文
共 50 条
  • [31] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [32] Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing
    Li, Xiang
    Tian, Hui
    Ning, Jianting
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 347 - 354
  • [33] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Nkenyereye, Lewis
    Park, Youngho
    Rhee, Kyung Hyune
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [34] Parallel search over encrypted data under attribute based encryption on the Cloud Computing
    Bouabana-Tebibel, Thouraya
    Kaci, Abdellah
    COMPUTERS & SECURITY, 2015, 54 : 77 - 91
  • [35] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [36] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [37] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [38] Server-aided revocable attribute-based encryption for cloud computing services
    Cui, Hui
    Yuen, Tsz Hon
    Deng, Robert H.
    Wang, Guilin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14):
  • [39] DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
    Nasiraee, H.
    Ashouri-Talouki, M.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2019, 32 (09): : 1290 - 1298
  • [40] Survey on Multi Authority Attribute Based Encryption for Personal Health Record in Cloud Computing
    Vahidhunnisha, J.
    Ramasamy, S.
    Balasubramaniam, T.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (12): : 51 - 55