Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

IJSRD
IJSRD Online Publisher & Journal en IJSRD.com

Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.

IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 278
Identifying the Performance Efficiency of Attribute Based Encryption
with Secured Resource in Cloud
J.Velmurugan1
C.Chanravathy2
P.Vinothkumar3
S.K.Manigandan4
D.Ramya5
1,2,3,4,5
Assistant Professor
1,2,3,5
Department of Information Engineering 4
Department of MCA
1,2,3,4,5
Veltech Hightech Dr.Rangarajan Dr. Sakunthala Engg. College, Chennai India
Abstract— Attribute-based encryption (ABE) can be used
for the encryption of data with attributes and logs. Instead of
encrypting each part of a log with the keys of all recipients,
it is possible to encrypt the log only with attributes which
match recipient’s attributes. This primitive can also be used
for broadcast encryption in order to decrease the number of
keys used. Here the access control will be given with the
keys and the attributes. The outsourcing computation cost
will be comparatively less when compared to the existing
system. The data will be shared between the two users if and
only if the key matches. In addition, for the first time, we
propose an outsourced ABE construction which provides
check ability of the outsourced computation results in an
efficient way. The performance analysis has been proven
this method to be more secured.
Key words: Attribute-based encryption, access control,
outsourcing computation, key issuing, check ability
I. INTRODUCTION
Attribute-based encryption (ABE) has created much
intention between the cloud users. For the first time in ABE
it has been introduced with a secured key sharing. Generally
in ABE system, user will have its private keys and
ciphertext along with its descriptive attributes only it
matches with the other user it reveals the data. Until now,
there are two kinds of ABE having been proposed: key-
policy attribute-based encryption (KP-ABE) and ciphertext-
policy attribute-based encryption (CP-ABE).
In KP-ABE, the sharing and the access policy is
assigned with the keys whereas, in CP-ABE, it is assigned
with ciphertext. Nowadays, security is being an obstacle to
the cloud services. Thus ABE will be the best policy to
securely outsource the data and will recover the data leaking
or sharing by the un trusted third party.
Nevertheless, one of the main efficiency drawbacks
of ABE is that the computational cost during decryption
phase grows with the complexity of the access formula.
Thus, before widely deployed, there is an increasing need to
improve the efficiency of ABE. To address this problem,
outsourced ABE, which provides a way to outsource
intensive computing task during decryption to CSP without
revealing data or private keys, was introduced [1], [2]. It has
a wide range of applications. For example, in the mobile
cloud computing consisting of mobile devices or sensors as
information collection nodes, user terminal (e.g., mobile
device) has limited computation ability to independently
complete basic encryption or decryption to protect sensitive
data residing in public cloud. Outsourced ABE allows user
to perform heavy decryption through ‘‘bor-rowing’’ the
computation resources from CSP. Therefore, in this
paradigm, the computation/storage intensive tasks can be
performed even by resource-constrained users.
Beyond the heavy decryption outsourced, we
observe that the attribute authority has to deal with a lot of
heavy computation in a scalable system. More precisely, the
attri-bute authority has to issue private keys to all users, but
yet generation of private key typically requires large
modular exponentiation computation, which grows linearly
with the complexity of the predicate formula. When a large
number of users call for their private keys, it may overload
the at-tribute authority. Moreover, key management
mechanism, key revocation in particular, is necessary in a
secure and scalable ABE system. In most of existing ABE
schemes, the revocation of any single private key requires
key-update at attribute authority for the remaining
unrevoked keys which share common attributes with the one
to be re-voked. All of these heavy tasks centralized at
authority side would make it an efficiency bottleneck in the
access control system.
II. CONTRIBUTION
Aiming at eliminating the most overhead computation at
both the attribute authority and the user sides, we propose an
outsourced ABE scheme not only supporting out-sourced
decryption but also enabling delegating key generation. In
this construction, we introduce a trivial policy controlled by
a default attribute and use an AND gate connecting the
trivial policy and user’s policy.
During key-issuing, attribute authority can
outsource computation through delegating the task of
generating partial private key for user’s policy to a key
generation service provider (KGSP) to reduce local
overhead. Moreover, the outsourced decryption is realized
by utilizing the idea of key blinding. More precisely, user
can send the blinded private key to a decryption service
provider (DSP) to perform partial decryption and do the
complete decryption at local. Following our technique,
constant efficiency is achieved at both attribute authority
and user sides.
In addition, we observe that when experiencing
com-mercial cloud computing services, the CSPs may be
selfish in order to save its computation or bandwidth, which
may cause results returned incorrectly. In order to deal with
this problem, we consider to realize checkability on results
returned from both KGSP and DSP, and provide a security
and functionality enhanced construction, which is provable
secure under the recent formulized refereed delegation of
computation (RDoC) model.
Out technique is to make a secret sharing on the
outsourcing key for KGSP and let k parallel KGSPs utilize
their individual share to generate partial private keys. After
that an additional key combina-tion phase is performed at
authority side to avoid malicious collaboration between at
most k _ 1 KGSPs and users. Moreover, we use the idea of
‘‘ringer’’ [3] and appending redundancy to fight against the
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 279
dishonest actions of KGSPs and DSP. As far as we know,
this is the first time considering the checkability of
outsourced ABE.
III. RELATED WORK
The notion of ABE, which was introduced as fuzzy identity-
based encryption in [1]., Two different and complementary
notions of ABE were defined in : KP-ABE and CP-ABE. A
construction of KP-ABE was provided in the same paper
[4], while the first CP-APE construction supporting tree-
based structure in generic group model is presented in [5].
Accordingly, several constructions support-ing for any kinds
of access structures were provided [6], [7] for practical
applications [8]. Concerning revocation of ABE, a
delegatable revocation is proposed in to achieve scalable
and fine-grained access control.
To reduce the load at local, it always desires to
deliver expensive computational tasks outside. Actually, the
problem that how to securely outsource different kinds of
expensive computations has drew considerable attention
from theoretical computer science community. [3] Presented
a framework for secure outsourcing of scientific
computations such as matrix multiplication and quadrature.
Nevertheless, the solution used the disguise technique and
thus leaded to leakage of private informa-tion. Atallah and
Li investigated the problem of computing the edit distance
between two sequences and presented an efficient protocol
to securely outsource se-quence comparison with two
servers. Furthermore, Benjamin and Atallah addressed the
problem of secure outsourcing for widely applicable linear
algebraic compu-tations. Nevertheless, the proposed
protocols required the expensive operations of
homomorphic encryption. In [9] further studied this problem
and gave improved protocols based on the so-called weak
secret hiding assumption. Recently, [7] presented efficient
mechanisms for secure outsourcing of linear programming
computation.
We note that though several schemes have been
intro-duced to securely outsource kinds of expensive
computa-tions, they are not suitable for reliving ABE
computational overhead of exponentiation at user side. To
achieve this goal, the traditional approach is to utilize
server-aided techniques [8], [9], [2]. However, previous
work are oriented to accelerating the speed of
exponentiation using untrusted servers. Directly utilizing
these techniques in ABE will not work efficiently. Another
approach might be to leverage recent general outsourcing
technique or del-egating computation [1] based on fully
homomorphic encryption, or interactive proof sys-tem.
However, Gentry [5] has shown that even for weak security
parameters on ‘‘bootstrapping’’ operation of the
homomorphic encryption, it would take at least 30 seconds
on a high performance machine. Therefore, even if the
privacy of the input and output can be preserved by uti-
lizing these general techniques, the computational over-head
is still huge and impractical.
Another several related work similar to us are [4],
[6], [3], [7]. In [3], a novel paradigm for outsourcing the
decryption of ABE is provided while in [4], [6] the authors
presented the ABE schemes which allow to securely
outsource both decryption and encryption to third party
service providers. Compared with our work, the two lack of
the consideration on the eliminating the overhead
computation at attribute authority. Additionally, we con-
sider a security and functionality enhanced construction
enabling checkability on returned results from CSPs.
Recently [8] proposed a concrete construction for ABE with
verifiable decryption, which achieves both security and
verifiability without random oracles. Their work appends a
redundancy with ciphertext and uses this redundancy for
correctness checking. We emphasize that compared with our
scheme their construction does not consider to offload the
overhead computation at authority by outsourcing key-
issuing.
IV. EXISTING SYSTEM
The existing Outsourced ABE solutions are able to offload
some intensive computing tasks to a third party the
verifiability of results returned from the third party has yet
to be addressed. The one of the main efficiency drawbacks
of ABE is that the computational cost during decryption
phase grows with the complexity of the access formula.
Thus, before widely deployed, there is an increasing need to
improve the efficiency of ABE. To address this problem,
outsourced ABE, which provides a way to outsource
intensive computing task during decryption to CSP without
revealing data or private keys, was introduced. When a large
number of users call for their private keys, it may overload
the attribute authority. Moreover, key management
mechanism, key revocation in particular, is necessary in a
secure and scalable ABE system. In most of existing ABE
schemes, the revocation of any single private key requires
key-update at attribute authority for the remaining
unrevoked keys which share common attributes with the one
to be re-voked.
V. PROPOSED SYSTEM
Aiming at eliminating the most overhead computation at
both the attribute authority and the user sides, we propose
an outsourced ABE scheme not only supporting outsourced
decryption but also enabling delegating key generation. In
this construction, we introduce a trivial policy controlled by
a default attribute and use an AND gate connecting the
trivial policy and user’s policy. During key-issuing, attribute
authority can outsource computation through delegating the
task of generating partial private key for user’s policy to a
key generation service provider (KGSP) to reduce local
overhead. Moreover, the outsourced decryption is realized
by utilizing the idea of key blinding. More precisely, user
can send the blinded private key to a decryption service
provider (DSP) to perform partial decryption and do the
complete decryption at local. Following our technique,
constant efficiency is achieved at both attribute authority
and user sides. In order to deal with this problem, we
consider to realize checkability on results returned from
both KGSP and DSP, and provide a security and
functionality enhanced construction.
VI. MODULES
 Registration and authority key generation
 Apply Privilege and KGSP key
 Uploading & Downloading
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 280
A. Registration and Authority Key Generation:
In this module, user will register their details into the cloud
manager. User has to fill all their own personal details,
based on the user attributes only key will be generated. Once
user registered completed, details will be sent to the cloud
for further processing. The Attribute Authority (AA) is to
provide partial key transformation based on users attribute.
Based on the user attributes AA provide key. Here ABE
scheme will be applied for key generation. After AA
generate key, then only user can login and do their further
process without attribute key user can’t login
B. Apply Privilege and KGSP Key:
In this module user has to set the access policy for their own
content. After user got permission from AA they login into
the application for setting privilege. Reason for setting
privilege is, who are all person will seen my uploaded
content. Only the authorized person only can download the
content and use it. For this reason only uploaded user set the
privilege for the content. User set privilege based on their
own attributes and also other attributes that they are not
specified in the registration. Once user applied privilege,
those information must be sent to the key generation service
provider (KGSP). At KGSP, generate a partial
transformation key based on the user’s attribute set. After
KGSP generate key, those key can be stored in the cloud
database. Based on the AA key and KGSP key, cloud
generate a user secret key for encrypt the uploaded content.
So, to outsource private key generation, we utilize a hybrid
key policy Policy=Policy (KGSP)^Policy(AA) where ^ is an
AND gate connecting two sub-policies Policy(KGSP) and
Policy(AA).
C. Uploading & Downloading:
In this module user upload own content and other
authorized user will download the content. Once user got
private key from cloud, they encrypt the upload content
based on their own private key. Once content encrypted, the
cipher text content must be stored in the cloud database. All
the uploaded files are maintained by cloud manager. If
another user logged into the application they requesting the
file for download. For download user has to enter the correct
attribute set and signature for the particular content. If the
user entered correct attribute set and signature means, cloud
allowed to download the file. Otherwise cloud doesn’t allow
user for download. So every user has to enter the correct
signature and attribute set name for content download.
Signature has been generated by Attribute Authority based
on the attribute partial key. So for any outsource the content
in the cloud means, here we provide the security. For every
outsource here we specified the service provider for check
ability.
VII. ARCHITECTURE DIAGRAM
VIII. KEY GENERATION GRAPH
A. Performance Variation in Keys
B. Key Generations
IX. CONCLUSION:
We provided an ABE system with the secured outsourcing
provided by KGSP and DSP providers. In addition, we
provide a trust-reduced construction with two KGSPs which
is secure under recently formulized RDoC model. Therefore
checkability is supported by this construction. The security
of proposed schemes have been analyzed and given in this
paper. Experimental results demonstrate that our
constructions are efficient and practical
REFERENCES
[1] A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based
Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT,
LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005,
pp. 457-473, Springer-Verlag.
[2] D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data
Dissemination in Delay Tolerant Networks,’’ IEEE
Trans. Parallel Distrib. Syst.
http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.
221
[3] M. Green, S. Hohenberger, and B. Waters,
‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in
Proc. 20th USENIX Conf. SEC, 2011, p. 34.
[4] Z. Zhou and D. Huang, ‘‘Efficient and Secure Data
Storage Operations for Mobile Cloud Computing,’’ in
Cryptology ePrint Archive, Report 2011/185, 2011.
[5] P. Golle and I. Mironov, ‘‘Uncheatable Distributed
Computations,’’ in Proc. Conf. Topics Cryptol., CT-
RSA, 2001, pp. 425-440.
[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
‘‘Attribute-Based Encryption for Fine-Grained Access
0%
20%
40%
60%
80%
100%
ATTRIBUTE
1
ATTRIBUTE
2
ATTRIBUTE
3
ATTRIBUTE
4
0
1
2
3
4
5
AA KGSP DSP SSP
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 281
Control of Encrypted Data,’’ in Proc. 13th ACM Conf.
Comput. Commun. Security, 2006, pp. 89-98.
[7] J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext-
Policy Attribute-Based Encryption,’’ in Proc. IEEE
Symp. Security Privacy, May 2007, pp. 321-334.
[8] L. Cheung and C. Newport, ‘‘Provably Secure
Ciphertext Policy ABE,’’ in Proc. 14th ACM Conf.
CCS, 2007, pp. 456-465.
[9] T. Nishide, K. Yoneyama, andK. Ohta, ‘‘Attribute-
Based Encryption with Partially Hidden Encryptor-
Specified Access Structures,’’ in Proc. Appl. Cryptogr.
Netw. Security, LNCS 5037, S. Bellovin, R. Gennaro,
A. Keromytis, and M. Yung, Eds., Berlin, Germany,
2008, pp. 111-129, Springer-Verlag.
[10]F. Han, J. Qin, H. Zhao, and J. Hu, ‘‘A General
Transformation from KP-ABE to Searchable
Encryption,’’ Future Gen. Comput. Syst., vol. 30, pp.
107-115, Jan. 2014.

Recomendados

IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme por
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET Journal
38 vistas5 diapositivas
Outsourced kp abe with chosen ciphertext security por
Outsourced kp abe with chosen ciphertext securityOutsourced kp abe with chosen ciphertext security
Outsourced kp abe with chosen ciphertext securitycsandit
346 vistas14 diapositivas
Improving Efficiency of Security in Multi-Cloud por
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
317 vistas4 diapositivas
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D... por
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
55 vistas11 diapositivas
Access Control and Revocation for Digital Assets on Cloud with Consideration ... por
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...IJERA Editor
34 vistas4 diapositivas
IRJET- Secure Skyline Queries over the Encrypted Data por
IRJET- Secure Skyline Queries over the Encrypted DataIRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET Journal
29 vistas4 diapositivas

Más contenido relacionado

La actualidad más candente

Dotnet 2015 2016 2017 ieee project list-with abstract por
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
109 vistas7 diapositivas
Attribute-Based Encryption for Access of Secured Data in Cloud Storage por
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
327 vistas3 diapositivas
Authentication on Cloud using Attribute Based Encryption por
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
758 vistas29 diapositivas
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage por
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
39 vistas6 diapositivas
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit... por
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
21 vistas5 diapositivas
Acquisition of Secured Data from Cloud por
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
15 vistas4 diapositivas

La actualidad más candente(18)

Attribute-Based Encryption for Access of Secured Data in Cloud Storage por IJSRD
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD 327 vistas
Authentication on Cloud using Attribute Based Encryption por Ankit Raj
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
Ankit Raj758 vistas
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage por IRJET Journal
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal39 vistas
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit... por IRJET Journal
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal21 vistas
Acquisition of Secured Data from Cloud por IJMTST Journal
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal15 vistas
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN por IRJET Journal
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET Journal30 vistas
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL por hiij
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
hiij116 vistas
Improved Secure Cloud Transmission Protocol por neirew J
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J34 vistas
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode... por IRJET Journal
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal12 vistas
Harnessing the cloud for securely outsourcing large scale systems of linear e... por IEEEFINALYEARPROJECTS
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Identity-Based Encryption with Outsourced Revocation in Cloud Computing por 1crore projects
Identity-Based Encryption with Outsourced Revocation in Cloud ComputingIdentity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
1crore projects93 vistas
Harnessing the cloud for securely outsourcing large scale systems of linear e... por JPINFOTECH JAYAPRAKASH
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Protection of data using linear programming and fhe technique in cloud computing por IAEME Publication
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication487 vistas
A Crypto-System with Embedded Error Control for Secure and Reliable Communica... por CSCJournals
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
CSCJournals208 vistas

Destacado

An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf... por
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...IJSRD
269 vistas4 diapositivas
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap... por
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...IJSRD
312 vistas3 diapositivas
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka... por
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...IJSRD
405 vistas5 diapositivas
Development of Balloon Forming Machine and its Control Using PLC por
Development of Balloon Forming Machine and its Control Using PLCDevelopment of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLCIJSRD
162 vistas4 diapositivas
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T... por
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...IJSRD
178 vistas4 diapositivas
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ... por
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...IJSRD
184 vistas4 diapositivas

Destacado(9)

An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf... por IJSRD
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
IJSRD 269 vistas
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap... por IJSRD
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
IJSRD 312 vistas
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka... por IJSRD
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
IJSRD 405 vistas
Development of Balloon Forming Machine and its Control Using PLC por IJSRD
Development of Balloon Forming Machine and its Control Using PLCDevelopment of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLC
IJSRD 162 vistas
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T... por IJSRD
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
IJSRD 178 vistas
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ... por IJSRD
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
IJSRD 184 vistas
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ... por IJSRD
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
IJSRD 351 vistas
A Comparative Study of Sensors for Road Traffic Density Measurement por IJSRD
A Comparative Study of Sensors for Road Traffic Density MeasurementA Comparative Study of Sensors for Road Traffic Density Measurement
A Comparative Study of Sensors for Road Traffic Density Measurement
IJSRD 810 vistas
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G... por IJSRD
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
IJSRD 223 vistas

Similar a Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim... por
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET Journal
15 vistas3 diapositivas
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage por
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
11 vistas8 diapositivas
C04932125 por
C04932125C04932125
C04932125IOSR-JEN
362 vistas5 diapositivas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
35 vistas6 diapositivas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso... por
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
406 vistas8 diapositivas
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption por
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
12 vistas7 diapositivas

Similar a Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud(20)

IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim... por IRJET Journal
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal15 vistas
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage por IRJET Journal
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal11 vistas
C04932125 por IOSR-JEN
C04932125C04932125
C04932125
IOSR-JEN362 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption por IRJET Journal
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal12 vistas
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
Attribute based encryption with verifiable outsourced decryption por IEEEFINALYEARPROJECTS
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS2.7K vistas
Data Security in Cloud Computing Using Linear Programming por IOSR Journals
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals946 vistas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por IRJET Journal
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal12 vistas
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S... por IRJET Journal
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal2 vistas
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely... por IEEEGLOBALSOFTTECHNOLOGIES
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
A Secure & Scalable Access Method in Cloud Computing por ijsrd.com
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com327 vistas
Data Access Control Schemes in Cloud Computing: A Review por IRJET Journal
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
IRJET Journal37 vistas
Key aggregate cryptosystem for scalable data sharing in cloud storage por Adz91 Digital Ads Pvt Ltd
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ... por IOSR Journals
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
IOSR Journals184 vistas
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing por IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal59 vistas
International Journal of Engineering and Science Invention (IJESI) por inventionjournals
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals504 vistas
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in... por IRJET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal18 vistas

Más de IJSRD

#IJSRD #Research Paper Publication por
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
245 vistas6 diapositivas
Maintaining Data Confidentiality in Association Rule Mining in Distributed En... por
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
401 vistas3 diapositivas
Performance and Emission characteristics of a Single Cylinder Four Stroke Die... por
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
333 vistas4 diapositivas
Preclusion of High and Low Pressure In Boiler by Using LABVIEW por
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
367 vistas5 diapositivas
Prevention and Detection of Man in the Middle Attack on AODV Protocol por
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
312 vistas2 diapositivas
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec... por
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
281 vistas3 diapositivas

Más de IJSRD (20)

#IJSRD #Research Paper Publication por IJSRD
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
IJSRD 245 vistas
Maintaining Data Confidentiality in Association Rule Mining in Distributed En... por IJSRD
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
IJSRD 401 vistas
Performance and Emission characteristics of a Single Cylinder Four Stroke Die... por IJSRD
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
IJSRD 333 vistas
Preclusion of High and Low Pressure In Boiler by Using LABVIEW por IJSRD
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
IJSRD 367 vistas
Prevention and Detection of Man in the Middle Attack on AODV Protocol por IJSRD
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
IJSRD 312 vistas
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec... por IJSRD
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
IJSRD 281 vistas
Evaluation the Effect of Machining Parameters on MRR of Mild Steel por IJSRD
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
IJSRD 252 vistas
Filter unwanted messages from walls and blocking nonlegitimate user in osn por IJSRD
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD 122 vistas
Keystroke Dynamics Authentication with Project Management System por IJSRD
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD 438 vistas
Diagnosing lungs cancer Using Neural Networks por IJSRD
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
IJSRD 358 vistas
A Survey on Sentiment Analysis and Opinion Mining por IJSRD
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
IJSRD 299 vistas
A Defect Prediction Model for Software Product based on ANFIS por IJSRD
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD 223 vistas
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a... por IJSRD
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
IJSRD 247 vistas
Product Quality Analysis based on online Reviews por IJSRD
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
IJSRD 198 vistas
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers por IJSRD
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
IJSRD 154 vistas
Study of Clustering of Data Base in Education Sector Using Data Mining por IJSRD
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD 117 vistas
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl... por IJSRD
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
IJSRD 221 vistas
Investigation of Effect of Process Parameters on Maximum Temperature during F... por IJSRD
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
IJSRD 247 vistas
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator por IJSRD
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
IJSRD 292 vistas
A Survey on Data Mining Techniques for Crime Hotspots Prediction por IJSRD
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
IJSRD 323 vistas

Último

ICS3211_lecture 09_2023.pdf por
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
126 vistas10 diapositivas
Narration lesson plan por
Narration lesson planNarration lesson plan
Narration lesson planTARIQ KHAN
64 vistas11 diapositivas
Classification of crude drugs.pptx por
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
104 vistas13 diapositivas
Purpose of maths student display.pptx por
Purpose of maths student display.pptxPurpose of maths student display.pptx
Purpose of maths student display.pptxchristianmathematics
190 vistas9 diapositivas
Create a Structure in VBNet.pptx por
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
80 vistas8 diapositivas
Mineral nutrition and Fertilizer use of Cashew por
 Mineral nutrition and Fertilizer use of Cashew Mineral nutrition and Fertilizer use of Cashew
Mineral nutrition and Fertilizer use of CashewAruna Srikantha Jayawardana
52 vistas107 diapositivas

Último(20)

Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN64 vistas
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra14104 vistas
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P80 vistas
GCSE Music por WestHatch
GCSE MusicGCSE Music
GCSE Music
WestHatch47 vistas
BÀI TẬP BỔ TRỢ TIẾNG ANH FAMILY AND FRIENDS NATIONAL EDITION - LỚP 4 (CÓ FIL... por Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH FAMILY AND FRIENDS NATIONAL EDITION - LỚP 4 (CÓ FIL...BÀI TẬP BỔ TRỢ TIẾNG ANH FAMILY AND FRIENDS NATIONAL EDITION - LỚP 4 (CÓ FIL...
BÀI TẬP BỔ TRỢ TIẾNG ANH FAMILY AND FRIENDS NATIONAL EDITION - LỚP 4 (CÓ FIL...
Relationship of psychology with other subjects. por palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200377 vistas
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239383 vistas
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1156 vistas
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare166 vistas
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP407 vistas

Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 278 Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud J.Velmurugan1 C.Chanravathy2 P.Vinothkumar3 S.K.Manigandan4 D.Ramya5 1,2,3,4,5 Assistant Professor 1,2,3,5 Department of Information Engineering 4 Department of MCA 1,2,3,4,5 Veltech Hightech Dr.Rangarajan Dr. Sakunthala Engg. College, Chennai India Abstract— Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured. Key words: Attribute-based encryption, access control, outsourcing computation, key issuing, check ability I. INTRODUCTION Attribute-based encryption (ABE) has created much intention between the cloud users. For the first time in ABE it has been introduced with a secured key sharing. Generally in ABE system, user will have its private keys and ciphertext along with its descriptive attributes only it matches with the other user it reveals the data. Until now, there are two kinds of ABE having been proposed: key- policy attribute-based encryption (KP-ABE) and ciphertext- policy attribute-based encryption (CP-ABE). In KP-ABE, the sharing and the access policy is assigned with the keys whereas, in CP-ABE, it is assigned with ciphertext. Nowadays, security is being an obstacle to the cloud services. Thus ABE will be the best policy to securely outsource the data and will recover the data leaking or sharing by the un trusted third party. Nevertheless, one of the main efficiency drawbacks of ABE is that the computational cost during decryption phase grows with the complexity of the access formula. Thus, before widely deployed, there is an increasing need to improve the efficiency of ABE. To address this problem, outsourced ABE, which provides a way to outsource intensive computing task during decryption to CSP without revealing data or private keys, was introduced [1], [2]. It has a wide range of applications. For example, in the mobile cloud computing consisting of mobile devices or sensors as information collection nodes, user terminal (e.g., mobile device) has limited computation ability to independently complete basic encryption or decryption to protect sensitive data residing in public cloud. Outsourced ABE allows user to perform heavy decryption through ‘‘bor-rowing’’ the computation resources from CSP. Therefore, in this paradigm, the computation/storage intensive tasks can be performed even by resource-constrained users. Beyond the heavy decryption outsourced, we observe that the attribute authority has to deal with a lot of heavy computation in a scalable system. More precisely, the attri-bute authority has to issue private keys to all users, but yet generation of private key typically requires large modular exponentiation computation, which grows linearly with the complexity of the predicate formula. When a large number of users call for their private keys, it may overload the at-tribute authority. Moreover, key management mechanism, key revocation in particular, is necessary in a secure and scalable ABE system. In most of existing ABE schemes, the revocation of any single private key requires key-update at attribute authority for the remaining unrevoked keys which share common attributes with the one to be re-voked. All of these heavy tasks centralized at authority side would make it an efficiency bottleneck in the access control system. II. CONTRIBUTION Aiming at eliminating the most overhead computation at both the attribute authority and the user sides, we propose an outsourced ABE scheme not only supporting out-sourced decryption but also enabling delegating key generation. In this construction, we introduce a trivial policy controlled by a default attribute and use an AND gate connecting the trivial policy and user’s policy. During key-issuing, attribute authority can outsource computation through delegating the task of generating partial private key for user’s policy to a key generation service provider (KGSP) to reduce local overhead. Moreover, the outsourced decryption is realized by utilizing the idea of key blinding. More precisely, user can send the blinded private key to a decryption service provider (DSP) to perform partial decryption and do the complete decryption at local. Following our technique, constant efficiency is achieved at both attribute authority and user sides. In addition, we observe that when experiencing com-mercial cloud computing services, the CSPs may be selfish in order to save its computation or bandwidth, which may cause results returned incorrectly. In order to deal with this problem, we consider to realize checkability on results returned from both KGSP and DSP, and provide a security and functionality enhanced construction, which is provable secure under the recent formulized refereed delegation of computation (RDoC) model. Out technique is to make a secret sharing on the outsourcing key for KGSP and let k parallel KGSPs utilize their individual share to generate partial private keys. After that an additional key combina-tion phase is performed at authority side to avoid malicious collaboration between at most k _ 1 KGSPs and users. Moreover, we use the idea of ‘‘ringer’’ [3] and appending redundancy to fight against the
  • 2. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 279 dishonest actions of KGSPs and DSP. As far as we know, this is the first time considering the checkability of outsourced ABE. III. RELATED WORK The notion of ABE, which was introduced as fuzzy identity- based encryption in [1]., Two different and complementary notions of ABE were defined in : KP-ABE and CP-ABE. A construction of KP-ABE was provided in the same paper [4], while the first CP-APE construction supporting tree- based structure in generic group model is presented in [5]. Accordingly, several constructions support-ing for any kinds of access structures were provided [6], [7] for practical applications [8]. Concerning revocation of ABE, a delegatable revocation is proposed in to achieve scalable and fine-grained access control. To reduce the load at local, it always desires to deliver expensive computational tasks outside. Actually, the problem that how to securely outsource different kinds of expensive computations has drew considerable attention from theoretical computer science community. [3] Presented a framework for secure outsourcing of scientific computations such as matrix multiplication and quadrature. Nevertheless, the solution used the disguise technique and thus leaded to leakage of private informa-tion. Atallah and Li investigated the problem of computing the edit distance between two sequences and presented an efficient protocol to securely outsource se-quence comparison with two servers. Furthermore, Benjamin and Atallah addressed the problem of secure outsourcing for widely applicable linear algebraic compu-tations. Nevertheless, the proposed protocols required the expensive operations of homomorphic encryption. In [9] further studied this problem and gave improved protocols based on the so-called weak secret hiding assumption. Recently, [7] presented efficient mechanisms for secure outsourcing of linear programming computation. We note that though several schemes have been intro-duced to securely outsource kinds of expensive computa-tions, they are not suitable for reliving ABE computational overhead of exponentiation at user side. To achieve this goal, the traditional approach is to utilize server-aided techniques [8], [9], [2]. However, previous work are oriented to accelerating the speed of exponentiation using untrusted servers. Directly utilizing these techniques in ABE will not work efficiently. Another approach might be to leverage recent general outsourcing technique or del-egating computation [1] based on fully homomorphic encryption, or interactive proof sys-tem. However, Gentry [5] has shown that even for weak security parameters on ‘‘bootstrapping’’ operation of the homomorphic encryption, it would take at least 30 seconds on a high performance machine. Therefore, even if the privacy of the input and output can be preserved by uti- lizing these general techniques, the computational over-head is still huge and impractical. Another several related work similar to us are [4], [6], [3], [7]. In [3], a novel paradigm for outsourcing the decryption of ABE is provided while in [4], [6] the authors presented the ABE schemes which allow to securely outsource both decryption and encryption to third party service providers. Compared with our work, the two lack of the consideration on the eliminating the overhead computation at attribute authority. Additionally, we con- sider a security and functionality enhanced construction enabling checkability on returned results from CSPs. Recently [8] proposed a concrete construction for ABE with verifiable decryption, which achieves both security and verifiability without random oracles. Their work appends a redundancy with ciphertext and uses this redundancy for correctness checking. We emphasize that compared with our scheme their construction does not consider to offload the overhead computation at authority by outsourcing key- issuing. IV. EXISTING SYSTEM The existing Outsourced ABE solutions are able to offload some intensive computing tasks to a third party the verifiability of results returned from the third party has yet to be addressed. The one of the main efficiency drawbacks of ABE is that the computational cost during decryption phase grows with the complexity of the access formula. Thus, before widely deployed, there is an increasing need to improve the efficiency of ABE. To address this problem, outsourced ABE, which provides a way to outsource intensive computing task during decryption to CSP without revealing data or private keys, was introduced. When a large number of users call for their private keys, it may overload the attribute authority. Moreover, key management mechanism, key revocation in particular, is necessary in a secure and scalable ABE system. In most of existing ABE schemes, the revocation of any single private key requires key-update at attribute authority for the remaining unrevoked keys which share common attributes with the one to be re-voked. V. PROPOSED SYSTEM Aiming at eliminating the most overhead computation at both the attribute authority and the user sides, we propose an outsourced ABE scheme not only supporting outsourced decryption but also enabling delegating key generation. In this construction, we introduce a trivial policy controlled by a default attribute and use an AND gate connecting the trivial policy and user’s policy. During key-issuing, attribute authority can outsource computation through delegating the task of generating partial private key for user’s policy to a key generation service provider (KGSP) to reduce local overhead. Moreover, the outsourced decryption is realized by utilizing the idea of key blinding. More precisely, user can send the blinded private key to a decryption service provider (DSP) to perform partial decryption and do the complete decryption at local. Following our technique, constant efficiency is achieved at both attribute authority and user sides. In order to deal with this problem, we consider to realize checkability on results returned from both KGSP and DSP, and provide a security and functionality enhanced construction. VI. MODULES  Registration and authority key generation  Apply Privilege and KGSP key  Uploading & Downloading
  • 3. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 280 A. Registration and Authority Key Generation: In this module, user will register their details into the cloud manager. User has to fill all their own personal details, based on the user attributes only key will be generated. Once user registered completed, details will be sent to the cloud for further processing. The Attribute Authority (AA) is to provide partial key transformation based on users attribute. Based on the user attributes AA provide key. Here ABE scheme will be applied for key generation. After AA generate key, then only user can login and do their further process without attribute key user can’t login B. Apply Privilege and KGSP Key: In this module user has to set the access policy for their own content. After user got permission from AA they login into the application for setting privilege. Reason for setting privilege is, who are all person will seen my uploaded content. Only the authorized person only can download the content and use it. For this reason only uploaded user set the privilege for the content. User set privilege based on their own attributes and also other attributes that they are not specified in the registration. Once user applied privilege, those information must be sent to the key generation service provider (KGSP). At KGSP, generate a partial transformation key based on the user’s attribute set. After KGSP generate key, those key can be stored in the cloud database. Based on the AA key and KGSP key, cloud generate a user secret key for encrypt the uploaded content. So, to outsource private key generation, we utilize a hybrid key policy Policy=Policy (KGSP)^Policy(AA) where ^ is an AND gate connecting two sub-policies Policy(KGSP) and Policy(AA). C. Uploading & Downloading: In this module user upload own content and other authorized user will download the content. Once user got private key from cloud, they encrypt the upload content based on their own private key. Once content encrypted, the cipher text content must be stored in the cloud database. All the uploaded files are maintained by cloud manager. If another user logged into the application they requesting the file for download. For download user has to enter the correct attribute set and signature for the particular content. If the user entered correct attribute set and signature means, cloud allowed to download the file. Otherwise cloud doesn’t allow user for download. So every user has to enter the correct signature and attribute set name for content download. Signature has been generated by Attribute Authority based on the attribute partial key. So for any outsource the content in the cloud means, here we provide the security. For every outsource here we specified the service provider for check ability. VII. ARCHITECTURE DIAGRAM VIII. KEY GENERATION GRAPH A. Performance Variation in Keys B. Key Generations IX. CONCLUSION: We provided an ABE system with the secured outsourcing provided by KGSP and DSP providers. In addition, we provide a trust-reduced construction with two KGSPs which is secure under recently formulized RDoC model. Therefore checkability is supported by this construction. The security of proposed schemes have been analyzed and given in this paper. Experimental results demonstrate that our constructions are efficient and practical REFERENCES [1] A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer-Verlag. [2] D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data Dissemination in Delay Tolerant Networks,’’ IEEE Trans. Parallel Distrib. Syst. http://doi.ieeecomputersociety.org/10.1109/TPDS.2013. 221 [3] M. Green, S. Hohenberger, and B. Waters, ‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in Proc. 20th USENIX Conf. SEC, 2011, p. 34. [4] Z. Zhou and D. Huang, ‘‘Efficient and Secure Data Storage Operations for Mobile Cloud Computing,’’ in Cryptology ePrint Archive, Report 2011/185, 2011. [5] P. Golle and I. Mironov, ‘‘Uncheatable Distributed Computations,’’ in Proc. Conf. Topics Cryptol., CT- RSA, 2001, pp. 425-440. [6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ‘‘Attribute-Based Encryption for Fine-Grained Access 0% 20% 40% 60% 80% 100% ATTRIBUTE 1 ATTRIBUTE 2 ATTRIBUTE 3 ATTRIBUTE 4 0 1 2 3 4 5 AA KGSP DSP SSP
  • 4. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 281 Control of Encrypted Data,’’ in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98. [7] J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext- Policy Attribute-Based Encryption,’’ in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334. [8] L. Cheung and C. Newport, ‘‘Provably Secure Ciphertext Policy ABE,’’ in Proc. 14th ACM Conf. CCS, 2007, pp. 456-465. [9] T. Nishide, K. Yoneyama, andK. Ohta, ‘‘Attribute- Based Encryption with Partially Hidden Encryptor- Specified Access Structures,’’ in Proc. Appl. Cryptogr. Netw. Security, LNCS 5037, S. Bellovin, R. Gennaro, A. Keromytis, and M. Yung, Eds., Berlin, Germany, 2008, pp. 111-129, Springer-Verlag. [10]F. Han, J. Qin, H. Zhao, and J. Hu, ‘‘A General Transformation from KP-ABE to Searchable Encryption,’’ Future Gen. Comput. Syst., vol. 30, pp. 107-115, Jan. 2014.