Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing

被引:0
|
作者
Gunjal, Yogita S. [1 ]
Gunjal, Mahesh S. [1 ]
Tambe, Avinash R. [2 ]
机构
[1] Amrutvahini Coll Engn, Dept Comp Engn, Sangamner, Maharashtra, India
[2] Amrutvahini Coll Engn, Dept Elect & Telecommun Engn, Sangamner, Maharashtra, India
关键词
Cipher-text-policy attribute-based encryption (CP-ABE); hybrid encryption; user authorization; circuits; multi-linear map; Dual Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most centralized systems allow data access to its cloud user if a cloud user has a certain set of satisfying attributes. Presently, one method to compete such policies is to use an authorized cloud server to maintain the user data and have access control over it. At times, when one of the servers keeping data is compromised, the security of the user data is compromised. For getting access control, maintaining data security and obtaining precise computing results, the data owners have to keep attribute-based security to encrypt the stored data. During the delegation of data on cloud, the cloud servers may be tampered by the counterfeit cipher-text. Furthermore, the authorized users may be cheated by retorting them that they are unauthorized. Largely the encryption control access attribute policies are complex. In this paper, we present Cipher-text Policy Attribute-Based Encryption for maintaining complex access control over encrypted data with verifiable customizable authorization. The proposed technique provides data confidentiality to the encrypted data even if the storage server is comprised. Moreover, our method is highly secured against collusion attacks. In advance, performance evaluation of the proposed system is elaborated with implementation of the same.
引用
收藏
页码:187 / 190
页数:4
相关论文
共 50 条
  • [41] A secure billing protocol over attribute-based encryption in vehicular cloud computing
    Lewis Nkenyereye
    Youngho Park
    Kyung Hyune Rhee
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [42] An Multi-Authority Attribute Based Encryption For Personal Health Record In Cloud Computing
    Shree, Iniya
    Narmatha, K.
    Vijesh, Joe. C.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [43] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [44] An improved attribute-based encryption technique towards the data security in cloud computing
    Namasudra, Suyel
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03):
  • [45] Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing
    Shao, Jiaye
    Zhu, Yanqin
    Ji, Qijin
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 417 - 422
  • [46] A Hybrid Encryption model for Secure Cloud Computing
    Olumide, Atewologun
    Alsadoon, Abeer
    Prasad, P. W. C.
    Pham, Linh
    2015 13TH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT & KNOWLEDGE ENGINEERING 2015), 2015, : 24 - 32
  • [47] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [48] Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing
    Yan, Hongyang
    Li, Xuan
    Du, Jiali
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 329 - 332
  • [49] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [50] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    IEEE ACCESS, 2019, 7 : 36218 - 36232