An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing
DOI:
https://doi.org/10.20894/IJMSR.117.009.002.001Keywords:
Cloud computing ,Data sharing ,File hierarchy, Key Policy ; Attribute Based Encryption (key words).Abstract
We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE).As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). Instead of trusting a middle layer authority , we perform an end to end encryption using the Key-Policy Attribute-Based Encryption (KP-ABE).Moreover the proposed system is proved to be secured under standard assumption. With the number of the files increasing, the advantages of our scheme become more and more usefull.
Downloads
References
[2] Minu George1, Dr. C.Suresh Gnanadhas2, Saranya.K3,” A Survey on Attribute Based Encryption Scheme in Cloud Computing" International Journal of Advanced Research in Computer and Communication EngineeringVol.2,Issue11,November2013.
[3] ChangjiWang1,2,3 and Jianfa Luo1,2 “An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length” Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013, Article ID 810969.
[4] Mr. Anup R. Nimje #1 , Prof. V. T. Gaikwad*2 ,Prof. H. N. Datir^3 “Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview” International Journal of Computer Trends and Technologyvolume4Issue3- 2013.
[5] John Bethencourt, Amit Sahai, Brent Waters “Ciphertext-Policy Attribute-Based Encryption” Supported the US Army Research Office under the CyberTA Grant No. W911NF-06-1-0316.
[6] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained two factor access control for web-based cloud computing services,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 484–497, March 2016.
[7] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” Advances in Cryptology–EUROCRYPT, pp. 457–473, May 2005.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryptionfor fine-grained access control of encrypted data,” Proceedings of the 13th ACM conference on Computer and communications security, pp. 89–98, October 2006.
[9] Shucheng Yu on Data Sharing on Untrusted Storage with Attribute-Based Encryption 2010.
[10] R. H. Deng, J. Weng, S. Liu, and K. Chen. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In Proc. of CANS?08, Berlin,Heidelberg, 2008.
[11] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of Access Control Evolution on Outsourced Data. In Proc. of VLDB’07, Vienna, Austria, 2007.
[12] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proc. of FAST’03, Berkeley,California, USA, 2003.
[13] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proc. of NDSS’03, 2003.
[14] S. Yu, K. Ren, W. Lou, and J. Li. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In Proc. of Securecomm’09, Athens, Greece, 2009.
[15] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy reencryption schemes with applications to secure distributed storage,” in Proc. of NDSS’05, 2005.
[16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. Of CCS’06, 2006.
[17] A. Sahai and B. Waters. Fuzzy Identity-Based Encryption. In Proc. of EUROCRYPT’ 05, Aarhus, Denmark, 2005.
[18] D. Boneh and M. Franklin. Identity-Based Encryption from The Weil Pairing. In Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.
[19] R. Ostrovsky, A. Sahai, and B. Waters. “Attribute-based encryption with non-monotonic access structures”. In Proc. of CCS’06, New York NY, 2007.[16] A. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption”,http://eprint.iacr.org/2010/351.
[20] Trusted Computing Group http://www.trustedcomputinggroup.org/ [21] Vipul Goyal¤ Omkant Pandeyy Amit Sahaiz Brent Waters on Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.
Downloads
Published
Issue
Section
License
Authors need to sign following agreement with International Journal of MC Square Scientific Research before publishing their articles:
- Authors need to return copyright form to Journal Editor-in-chief to proceed their articles for publication. Meantime, the journal licensed under a Creative Commons Attribution License, which permits other user to distribute the work with an acknowledgement of the authors for International Journal of MC Square Scientific Research.
- Authors are also able to share their separate, additional contractual arrangements for the non-restricted contribution of the journal with an acknowledgement of publication in International Journal of MC Square Scientific Research.
- Authors are allowed and encouraged to share their work during the submission process for increasing citation and exploring to increase the paper availability in worldwide way. The Effect of Open Access.