Implemented Hybrid Encryption Algorithm with Variable Delegation for Data Security in the Cloud

Authors

  • Katpadi Baby Shalini  PG Scholar, Department of CSE, PACE Institute of Technology and Sciences,Vallur, Prakasam, Andhra Pradesh, India
  • Vuyyuru Lakshma Reddy  Assistant Professor, Department of CSE, PACE Institute of Technology and Sciences, Vallur, Prakasam, Andhra Pradesh, India

Keywords:

Ciphertext-Policy Attribute-Based Encryption, Circuits, Verifiable Delegation, Multi Linear Map, Hybrid Encryption

Abstract

In the cloud, for accomplishing access control and information security, the information proprietors could utilizes ascribe based encryption to scramble the put away information. To decrease the cost, the users which has a restricted processing power are by the by more prone to assign the cover of the unscrambling errand to the cloud servers. The outcome appears, quality based encryption with appointment turn out. In any case, there are a few issues and inquiries with respect to past related works. For instance, amid the assignment or discharge, the cloud servers could distort or supplant the appointed ciphertext and react a phony outcome with vindictive expectation. And in addition with the end goal of cost sparing the cloud server may likewise extortion the qualified clients by reacting them that they are unworthy. Indeed, the entrance approaches may not be adaptable amid the encryption. Since strategy for general circuits are utilized to accomplish the most grounded type of access control, a development to configuration circuit ciphertext-approach quality based cross breed encryption with irrefutable assignment has been produced. This framework is blended with certain calculation and encode then-Mac component, the information classification, the fine-grained get to control and additionally the rightness of the appointed processing comes about are very much ensured in the meantime. And in addition this plan accomplishes security against picked plaintext assaults under the k-multilinear Decisional Diffie-Hellman presumption. Besides, this plan accomplishes plausibility and in addition effectiveness.

References

  1. J. Li, X. Huang, J. Li, X. Chen and Y. Xiang, "Securely Outsourcing Attribute-based Encryptionwith Checkability," in Proc. IEEE Transactions on Parallel and Distributed Systems, 2013.
  2. J. Han, W. Susilo, Y. Mu and J. Yan, "Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption," in Proc. IEEE Transactions on Parallel and Distributed Systems, 2012.
  3. J. Hur and D. K. Noh,"Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," in Proc. IEEE Transactions on Parallel and Distributed Systems, 2011.
  4. B. Waters, "Ciphertext-Policy Attribute-Based Encryption: an Expressive, Enficient, and Provably Secure Realization," in Proc. PKC, pp.53-70, Springer-Verlag Berlin, Heidelberg, 2011.
  5. A. Lewko and B. Waters, "Decentralizing Attribute- Based Encryption," in Proc. EUROCRYPT, pp.568-588, Springer-Verlag Berlin, Heidelberg, 2011.
  6. W. Nagao, Y. Manabe and Tatsuaki Okamoto, "AUniversally Composable Secure Channel Based on the KEM-DEM Framework," in Proc. CRYPTO, pp.426-444, Springer-Verlag Berlin, Heidelberg, 2005.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Katpadi Baby Shalini, Vuyyuru Lakshma Reddy, " Implemented Hybrid Encryption Algorithm with Variable Delegation for Data Security in the Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1014-1017, November-December-2017.