Contact Project Developer Ashish D. Tiwari [astiwz@gmail.com]
Download Synopsis Abstract
Cloud Java Data Mining BE-Engineering(CO/IT) ME-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT Diploma (CO/IT) IEEE-2016

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-basedencryption to encrypt the stored data.
Abstract-Synopsis-Documentation

View MoreAbstract

In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-basedencryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of thedecryption task to the cloud servers to reduce the computing cost. As a result, attribute-based encryption with delegation emerges. Still,

there are caveats and questions remaining in the previous relevant works. For instance, during the delegation, the cloud servers couldtamper or replace the delegated ciphertext and respond a forged computing result with malicious intent. They may also cheat theeligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the accesspolicies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, aconstruction for realizing circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation has been considered in ourwork. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, thefine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, ourscheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, anextensive simulation campaign confirms the feasibility and efficiency of the proposed solution.

View More

.

Comment is Only Available for registered users! Create Account or Login Now!