An Efficient Key Policy Attribute Based Encryption Scheme In Cloud Computing

Authors

  • Shiva Nandhini J

DOI:

https://doi.org/10.20894/IJMSR.117.009.002.001

Keywords:

Cloud computing ,Data sharing ,File hierarchy, Key Policy ; Attribute Based Encryption (key words).

Abstract

We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE).As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). Instead of trusting a middle layer authority , we perform an end to end encryption using the Key-Policy Attribute-Based Encryption (KP-ABE).Moreover the proposed system is proved to be secured under standard assumption. With the number of the files increasing, the advantages of our scheme become more and more usefull.

Downloads

Download data is not yet available.

Author Biography

Shiva Nandhini J

Assistant Professor, Department of Computer Science and Engineering SRM University,Ramapuram,Chennai.

References

[1] T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “ktimesattribute-based anonymous access control for cloud computing,” IEEE Transactions on Computers, vol. 64, no. 9, pp. 2595–2608, September 2015.

[2] Minu George1, Dr. C.Suresh Gnanadhas2, Saranya.K3,” A Survey on Attribute Based Encryption Scheme in Cloud Computing" International Journal of Advanced Research in Computer and Communication EngineeringVol.2,Issue11,November2013.

[3] ChangjiWang1,2,3 and Jianfa Luo1,2 “An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length” Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013, Article ID 810969.

[4] Mr. Anup R. Nimje #1 , Prof. V. T. Gaikwad*2 ,Prof. H. N. Datir^3 “Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview” International Journal of Computer Trends and Technologyvolume4Issue3- 2013.

[5] John Bethencourt, Amit Sahai, Brent Waters “Ciphertext-Policy Attribute-Based Encryption” Supported the US Army Research Office under the CyberTA Grant No. W911NF-06-1-0316.

[6] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained two factor access control for web-based cloud computing services,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 484–497, March 2016.

[7] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” Advances in Cryptology–EUROCRYPT, pp. 457–473, May 2005.

[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryptionfor fine-grained access control of encrypted data,” Proceedings of the 13th ACM conference on Computer and communications security, pp. 89–98, October 2006.

[9] Shucheng Yu on Data Sharing on Untrusted Storage with Attribute-Based Encryption 2010.

[10] R. H. Deng, J. Weng, S. Liu, and K. Chen. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In Proc. of CANS‟08, Berlin,Heidelberg, 2008.

[11] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of Access Control Evolution on Outsourced Data. In Proc. of VLDB’07, Vienna, Austria, 2007.

[12] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proc. of FAST’03, Berkeley,California, USA, 2003.

[13] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing remote untrusted storage,” in Proc. of NDSS’03, 2003.

[14] S. Yu, K. Ren, W. Lou, and J. Li. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In Proc. of Securecomm’09, Athens, Greece, 2009.

[15] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy reencryption schemes with applications to secure distributed storage,” in Proc. of NDSS’05, 2005.

[16] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. Of CCS’06, 2006.

[17] A. Sahai and B. Waters. Fuzzy Identity-Based Encryption. In Proc. of EUROCRYPT’ 05, Aarhus, Denmark, 2005.

[18] D. Boneh and M. Franklin. Identity-Based Encryption from The Weil Pairing. In Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001.

[19] R. Ostrovsky, A. Sahai, and B. Waters. “Attribute-based encryption with non-monotonic access structures”. In Proc. of CCS’06, New York NY, 2007.[16] A. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption”,http://eprint.iacr.org/2010/351.

[20] Trusted Computing Group http://www.trustedcomputinggroup.org/ [21] Vipul Goyal¤ Omkant Pandeyy Amit Sahaiz Brent Waters on Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.

Downloads

Published

2017-08-26

Issue

Section

Articles