Efficient revocation and Data Retrieval in Cloud Storage using CP-ABE

Ch Amrutha, S V krishna Reddy

Abstract


As cloud computing ends up common, more encrypted data are being incorporated into the cloud. For the insurance of data protection, encrypted data more often than not need to be scrambled before redistributing, which makes powerful data usage an extremely difficult assignment. In this paper, we propose another technique to empower successful fuzzy keyword seek in a multi-client framework over encoded cloud data while keeping up catchphrase security. In this new framework, differential looking benefits are bolstered, which is accomplished with the strategy of characteristic based encryption. Data proprietors are inspired to store their profitable data in the cloud, now the issue emerges how to ensure significant data against assaults and dangers. In this paper we are presenting secure Attribute Based Encryption for ensuring profitable data and further quicker looking and getting to of encoded data dependent on programmed comment based seeking method.


References


Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing Na Wang, Junsong Fu, Bharat K. Bhargava, Fellow, IEEE, Jiwen Zeng IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO. , 2017

S. Kamara and K. Lauter, “Cryptographic cloud storage,” in RLCPS,January 2010, LNCS. Springer, Heidelberg.

Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches on remote encrypted data,” in Proc. of ACNS, 2005.

R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of ACM CCS, 2006.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. of EUROCRYPT, 2004.

D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S. III, “Public key encryption that allows pir queries,” in Proc. of CRYPTO, 2007.

] L. Ibraimi, M. Asim, & M. Petkovic, Secure management of personal health records by applying attribute-based encryption, In Wearable Micro and Nano Technologies for Personalized Health (pHealth), IEEE,pp. 71-74, 2009.

A. Bessani,M. Correia,B. Quaresma, F. André, & P. Sousa, DepSky: dependable and secure storage in a cloud-of-clouds, ACM Transactions on Storage (TOS), vol.9(4), pp. 12, 2013.

A. Lewko, & B. Waters, New proof methods for attribute-based encryption: Achieving full security through selective techniques, In Advances in Cryptology–CRYPTO ,Springer Berlin Heidelberg, pp. 180-198, 2012.

J.Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, Proc. IEEE Symp. Security and Privacy (SP ’07), pp. 321-334, 2007.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.