A Hybrid Two Layer Attribute Based Encryption for Privacy Preserving in Public Cloud

被引:0
|
作者
Verma, Shiva [1 ]
Ahuja, Sachin [2 ]
机构
[1] Chitkara Univ, Dept Comp Sci & Engn, Chandigarh, India
[2] Chitkara Univ, Chitkara Univ Res & Innovat Network, Chandigarh, India
关键词
Privacy; identity; cloud computing; encryption; attribute;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most of the current approaches are to secure confidential data hosted in cloud based on the attribute based encryption. Under such approaches, data owners are in charge of encrypting the data before uploading them and whenever user authorizations policies changes re-encrypting the data would performed. Thus the communication and computation cost at owner side is high. While assuring data confidentiality from the cloud and to minimize the overhead at the owner side, a revaluation of access control, based on attributes needs to be induced in cloud. Based on two layers of encryption we propose a new framework that addresses such requirement. Under our framework owner perform single layer as well double layer encryption. From this our system assures the confidentiality of data and preserves the privacy of users form the cloud while delegating most of the access control enforcement to the cloud.
引用
收藏
页码:174 / 178
页数:5
相关论文
共 50 条
  • [1] Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment
    Komninos, Nikos
    Junejo, Aisha Kanwal
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 595 - 600
  • [2] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [3] Privacy preserving spatio-temporal attribute-based encryption for cloud applications
    Routray, Kasturi
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [4] Location Privacy Preserving Scheme Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    Ke, Yan
    Yang, Xiaoyuan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 164 - 177
  • [5] Privacy Preserving Ciphertext Policy Attribute Based Encryption
    Balu, A.
    Kuppusamy, K.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 402 - 409
  • [6] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [7] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [8] An Efficient Hybrid Approach of Attribute Based Encryption For Privacy Preserving Through Horizontally Partitioned Data
    Vashi, Devendrasinh
    Bhadka, H. B.
    Patel, Kuntal
    Garg, Sanjay
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2437 - 2444
  • [9] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [10] Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
    Song, Yujiao
    Wang, Hao
    Wei, Xiaochao
    Wu, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019