Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

0
543
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Abstract

In the cloud, data owners could adopt attribute-based encryption to encrypt the stored data to achieve access control and keep data confidential. However, users with limited computing power are more likely to delegate the decryption task mask to the cloud servers to reduce computing costs. Circuit Cipher Text Policy Hybrid Encryption with Verifiable Delegation in Cloud Computing As a result, delegation-based attribute encryption emerges. Still, the previous relevant works contain caveats and questions. Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing For example, the cloud servers could tamper or replace the delegated ciphertext during the delegation and respond with malicious intent to a forged computing result. They may also cheat eligible users by responding that they are ineligible for cost saving purposes. In addition, the access policies may not be flexible enough during encryption.

Advantages

  • The generic KEM/DEM construction for hybrid encryption which can encrypt messages of arbitrary length.
  • They seek to guarantee the correctness of the original ciphertext by using a commitment.
  • We give the anti-collusion circuit CP-ABE construction in this paper for the reason that CPABE is conceptually closer to the traditional access control methods.

Disadvantages

  • The cloud server might tamper or replace the data owner’s original ciphertext for malicious attacks, and then respond a false transformed ciphertext.
  • The cloud server might cheat the authorized user for cost saving. Though the servers could not respond a correct transformed ciphertext to an unauthorized user, he could cheat an authorized one that he/she is not eligible.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

To the best of our knowledge, we present a circuit ciphertext-policy attribute-based hybrid encryption with a verifiable delegation scheme. General circuits are used to express the strongest form of policy on access control. Combined verifiable computation and encryption-then-mac mechanism with our ciphertextpolicy attribute-based hybrid encryption, we could delegate the verifiable partial decryption paradigm to the cloud server. In addition, the proposed scheme is proven to be secure based on the assumption of k-multilinear Decisional Diffie-Hellman.