Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption
نویسندگان
چکیده
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further to achieve a secure and dependable cloud storage service, we develop a new cryptosystem for fine-grained sharing of encrypted data that we call Cipher-Policy Attribute-Based Encryption (CP-ABE) with verifiable outsourced decryption. In our cryptosystem, cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. This scheme also eliminates the overhead caused due to large number of pairing operations in decryption. Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. So, in order to check the correctness of transformation done, we introduce the concept of verifiability. The proposed design consist of efficient methods that enable on-demand data correctness verification. ABE[Attribute based Encryption] extends the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control of ABE. A traditional Cloud security concept ensures the Identity based Cryptography which results in secured outsourcing of cloud data.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملCP-ABE with Fine-Grained Access Control and Verifiable Delegation in Cloud Computing
With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptograp...
متن کاملSecurity and Privacy Challenges Mona in Cloud Computing Using Signature Generation
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in the cloud. In order ...
متن کاملSharing Data in Cloud Based on Trust Attribute Based Encryption (tabe)
Now a day’s everyone storing there data in cloud because we can’t depends on hard drives if they crash one can’t have backup for ever data. Famous Cloud storage applications are Drop box, Google drive, Sky drive, Box, Amazon cloud drive, Surdoc and Apple icloud. In cloud data security is provided by various security algorithms. In our research we have chosen attribute based encryption technique...
متن کاملAttribute Based Encryption Schemes for Efficient Verifiable Data Sharing
Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015