CP-ABE with Fine-Grained Access Control and Verifiable Delegation in Cloud Computing

ثبت نشده
چکیده

With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptographic primitive which significantly enhances the flexibility of entry manage mechanisms. There are two complementary types of attribute headquartered encryption. One is key-policy attribute-based encryption (KPABE) and the opposite is cipher text-policy attribute-based encryption (CPABE). In a KP-ABE process, the decision of access coverage is made by the important thing distributor instead of the encipherer, which limits the practicability and value for the system in useful functions. On the contrary, in a CP-ABE system, every cipher textual content is associated with an entry constitution, and each confidential secret is labeled with a collection of descriptive attributes. A circuit ciphertext-policy attribute-founded hybrid encryption with verifiable delegation scheme is offered to precise the strongest type of access control coverage. Ciphertext policy attribute-founded hybrid encryption is built-in with verifiable computation and the encrypt-then-mac mechanism to delegate the verifiable partial decryption paradigm to the cloud server.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to a...

متن کامل

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud

As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the...

متن کامل

Security and Privacy Challenges Mona in Cloud Computing Using Signature Generation

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in the cloud. In order ...

متن کامل

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

With the growing popularity of cloud computing, organizations and data owners starts to outsource their important data to the public cloud for reduced management cost and ease of access. Encryption helps to protect user data confidentiality, it makes difficult to perform secure plain text search over the encrypted data. In this paper, we present some combination between verifiable computation a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016