Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing

被引:0
|
作者
Gunjal, Yogita S. [1 ]
Gunjal, Mahesh S. [1 ]
Tambe, Avinash R. [2 ]
机构
[1] Amrutvahini Coll Engn, Dept Comp Engn, Sangamner, Maharashtra, India
[2] Amrutvahini Coll Engn, Dept Elect & Telecommun Engn, Sangamner, Maharashtra, India
关键词
Cipher-text-policy attribute-based encryption (CP-ABE); hybrid encryption; user authorization; circuits; multi-linear map; Dual Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most centralized systems allow data access to its cloud user if a cloud user has a certain set of satisfying attributes. Presently, one method to compete such policies is to use an authorized cloud server to maintain the user data and have access control over it. At times, when one of the servers keeping data is compromised, the security of the user data is compromised. For getting access control, maintaining data security and obtaining precise computing results, the data owners have to keep attribute-based security to encrypt the stored data. During the delegation of data on cloud, the cloud servers may be tampered by the counterfeit cipher-text. Furthermore, the authorized users may be cheated by retorting them that they are unauthorized. Largely the encryption control access attribute policies are complex. In this paper, we present Cipher-text Policy Attribute-Based Encryption for maintaining complex access control over encrypted data with verifiable customizable authorization. The proposed technique provides data confidentiality to the encrypted data even if the storage server is comprised. Moreover, our method is highly secured against collusion attacks. In advance, performance evaluation of the proposed system is elaborated with implementation of the same.
引用
下载
收藏
页码:187 / 190
页数:4
相关论文
共 50 条
  • [1] Enhanced Attribute Based Encryption for Cloud Computing
    Kumar, Saravana N.
    Lakshmi, Rajya G., V
    Balamurugan, B.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 689 - 696
  • [2] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [3] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [4] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [5] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [6] Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
    Xu, Jie
    Wen, Qiaoyan
    Li, Wenmin
    Jin, Zhengping
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 119 - 129
  • [7] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [8] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [9] Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing"
    Cao, Zhengjun
    Markowitch, Olivier
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 392 - 393
  • [10] Attribute-Based Authorization for Grid Computing
    Khider, Husam
    Osman, Taha
    Sherkat, Nasser
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 71 - 74