AN EFFICIENT PRIVACY FOR OUTSOURCING DATA IN UNTRUSTING CLOUD USING MODIFIED- CP-ABE TECHNIQUE
Keywords:Access control, Attribute based encryption, Key policy, cipher text policy, hierarchical-ASBE.
Cloud computing is going to be very famous technology in IT enterprises. For an
enterprise, the data stored is huge and it is very precious. All tasks are performed through
networks. Hence, it becomes very important to have the secured use of data. In cloud
computing, the most important concerns of security are data security and privacy. And also
flexible and scalable, fine grained access control must be maintained in the cloud systems. For
access control, being one of the classic research topics, many schemes have been proposed
and implemented. There are policy based schemes have been proposed. In this paper, we are
going to explore various schemes for encryption that consist of Attribute based encryption
(ABE) and its types CP-ABE. Further discussion consists of improvement in CP-ABE to CPASBE
and to HASBE. A comparison table has been included for comparative study of these
techniques. In this project, we propose a framework for efficient and privacy-preserving
outsourced cloud using CP-ABE technique. Our proposed technique is designed to allow
users to outsource their own data to cloud server for secure processing. Using CP-ABE, a user
can securely outsource the storing and processing of data to a cloud server without
compromising the security of the (original) data and the computed results. More specifically,
we present a cipher policy attribute based encryption with RSA key distribution, the core
cryptographic primitive, to reduce the private key exposure risk in data processing.
 Ivan Damgård, Thomas P. Jakobsen, JesperBuus Nielsen, and Jakob I. Pagter, “Secure Key Management in the Cloud”, Cryptography and Coding Lecture Notes in Computer Science, volume 8306, pp. 270-289, Springer, 2013.
A. Beimel, “Secret-sharing schemes: A survey,” in Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao,China, May 30-June 3, 2011. Proceedings, 2011, pp. 11–46.
Y.G.Min, Y.H.Bang, “Cloud Computing Security Issues and Access Control Solutions”, Journel of Security Engineering, vol.2, 2012.
 ChangjiWang1,2,3 and Jianfa Luo1,2 “An EfficientKey-Policy Attribute-Based Encryption Scheme with Constant Cipher text Length” Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013.
M. Bellare and P. Rogaway. Optimal asymmetricencryption - how to encrypt with RSA. In Proc. Eurocrypt1994.
Shinde, G.N. and H.S. Fade War,.Faster RSA algorithm fordecryption using Chinese remainder theorem. ICCES,Vol.5,No.4,pp.255-261,2008.
 T. Kawno, S. Matsui, T. Yasue, and C. Konno, “Secure Communication Infrastructure for Mobile,” in Hitach Review, vol. 48, no. 1, pp. 15-20, 1999.
Prasad Saripalli, and Ben Walters, “QUIRC: a quantitative impactandrisk assessment framework for cloud security,” IEEE 2rd InternationalConference on Cloud Computing (2010).
 T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey,you,getoff of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009.
Authors need to sign following agreement with International Journal of MC Square Scientific Research before publishing their articles:
- Authors need to return copyright form to Journal Editor-in-chief to proceed their articles for publication. Meantime, the journal licensed under a Creative Commons Attribution License, which permits other user to distribute the work with an acknowledgement of the authors for International Journal of MC Square Scientific Research.
- Authors are also able to share their separate, additional contractual arrangements for the non-restricted contribution of the journal with an acknowledgement of publication in International Journal of MC Square Scientific Research.
- Authors are allowed and encouraged to share their work during the submission process for increasing citation and exploring to increase the paper availability in worldwide way. The Effect of Open Access.