ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Efficient Cloud Security System Using Double Secret Key Decryption Process for Secure Cloud Environments

Journal: International Journal of Advanced Scientific Research & Development (IJASRD) (Vol.03, No. 01)

Publication Date:

Authors : ; ;

Page : 134-139

Keywords : Privacy Preserving; Key Revocation; Security Encryption; Access Control Policy.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Internet technology is growing quickly, and people can process, store, or share with their data by using its ability. Cloud shares infrastructure between several organizations and it is managed internally or by a third-party. The user stores the data in an encrypted format. ABE is an encryption scheme used by the user to store the data in the cloud. ABE is a public-key based one to many encryption techniques which allows users to encrypt and decrypt data based on user attributes. Access control of encrypted data stored in the cloud is, by using access polices and ascribed attributes associated with private keys and cipher texts. In existing ABE schemes decryption has expensive paring operations and the complexity of the access policy is proportional to the number of attributes. An ABE system with outsourced decryption eliminates the decryption overhead. Here user provides data to the cloud service provider, with a transformation key that allows the cloud to translate any ABE cipher text satisfied with the user's attributes or access policy into a simple cipher text. In this paper, use the security model of ABE with verifiable outsourced decryption by providing the verification key at the time of output decryption. We can implement this approach in real time cloud environments.

Last modified: 2019-02-11 03:18:02