FIND KEY TO EFFICIENT AND EXPRESSIVE WAY AROUND DATA ENCRYPTION IN THE CLOUD

D. Dhanalakshmi, Y.Rajesh Babu

Abstract


We propose a file encryption scheme with a hierarchical attribute for specialized files in cloud computing. We recommend the layer type of the access structure to solve the problem of multiple series files that are discussed. We carry out and implement a comprehensive test of the FH-Club penguin-ABE plan. In the existing system, the cost and time to encrypt files is high, the system understands some time and the cost of the expenses is too high. The access structure to the layer is integrated into a single access structure, and then the hierarchical files are encrypted using the integrated access architecture. The encrypted text components associated with the attributes can be shared through files. The penguin-ABE systems of the club are achievable and have a lot of versatility and, therefore, are more suitable for general applications. Several hierarchical discussion files are resolved using the Layer Type access structure. In the proposed system, the encryption text storage and the file encryption time are stored. As the files grow, the benefits of our plan become clearer. Therefore, the storage of encryption text and the price of encryption time of the files are stored. In addition, the proposed plan has proven to be safe under the normative assumption.


Keywords


Hierarchical File Sharing; Cipphertext; Encryption; Cloud Service Provider;

References


Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,” in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146–166.

Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743–754, Apr. 2012.

X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably secure and efficient bounded cipher text policy attribute based encryption,” in Proc. 4th Int. Symp. Inf., Comput., Commun. Secur., Mar. 2009, pp. 343–352.

Shulan Wang, Junwei Zhou, Member, IEEE, Joseph K. Liu, Member, IEEE,Jianping Yu, Jianyong Chen, and WeixinXie, “An Efficient File Hierarchy Attribute-BasedEncryption Scheme in Cloud Computing”, ieee transactions on information forensics and security, vol. 11, no. 6, june 2016.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated cipher text-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323.

S. Hohenberger and B. Waters, “Online/offline attribute-based encryption,” in Proc. 17th Int. Conf. Pract. Theory Public-Key Cryptogr. (PKC), vol. 8383. Mar. 2014, pp. 293–310.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.