Attribute-Based Encryption Schemes for Users and Cloud Server in Green Cloud Computing : Cost-Efficient Outsourced Decryption
Keywords:
Attribute-Based Encryption, Outsourced Decryption, Bilinear Maps, Green Cloud ComputingAbstract
The green cloud networks assist in lowering user costs by lowering the cost of decryption and preventing the leak of private information. However, this approach is ineffective for cloud servers in green cloud networks. In order to lower the overall overhead of the cloud server, we have suggested account recyclable usage of resources. This is a novel and secure solution. Another strategy we've suggested in our schemes is outsourcing the attribute-based encryption (ABE) scheme's decryption to a cloud server. However, the cloud server must repeatedly perform the same ciphertext decryption for various users who adhere to the same access policy. Therefore, in contrast to the current ABE-OD methods, our cloud server's overall overhead is unaffected by the number of users that comply with an access policy and request the outsourcing decryption service. Finally, we expand our strategy to an ABE-OD scheme that is RCCA secure.
References
- The global cloud computing market report 2019.
- J Agarkhed, R Ashalatha-”An efficient auditing scheme for data storage security in cloud”.2017[ICCPCT].
- SK Saroj, G Noida, SKChauhan, AK Sharma “Threshold cryptography based data security in cloud computing”.S Vats-2015. [4] C. C. Aggarwal, “Opinion mining and sentiment analysis,” in Machine Learning for Text. Springer, 2018, pp. 413–434.
- Mell, Peter, and Tim Grance.The NIST definition of cloud computing (2011).
- SwapnaliMorea, SangitaChaudhari,”Third Party Public Auditing Scheme for Cloud Storage “,International Journal of Prpcedia Computer Science ,Volume 79,pp.69-76,2016.
- Zissis, Dimitrios, and DimitriosLekkas. Addressing cloud computing security issues. Future Generation computer systems 28.3(2012):583-592.
- B.L Adokshaja, and S.J.Saritha,”Third Party Public Auditing on Cloud Storage using the Cryptographic Algorithm”ICECDS-2017.
- Cong Wang, Sherman SM Chow, Qian Wang, KuiRen, and WenjingLou.”Privacy Preserving Public Auditing for Secure Cloud Storage.http://eprint.iacr.org/2009/579.pdf.
- Cong Wong, Sherman S M Chow, Qian Wang, KuiRen, and Wen jing Lou.“Privacy Preserving Public Auditing for Secure Cloud Storage”. IEEE Transactions on Computers, Volume 62, ISSUE 2, February 2013.
- AbhishekMohta, Ravi Kant Sahu, Lalit Kumar. “Robust Data Security for Cloud while using Third Party Auditor”. International journal of advanced research in CSE (IJARCSE), Volume 2, Issue 2, February 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.