SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 278
Identifying the Performance Efficiency of Attribute Based Encryption
with Secured Resource in Cloud
J.Velmurugan1
C.Chanravathy2
P.Vinothkumar3
S.K.Manigandan4
D.Ramya5
1,2,3,4,5
Assistant Professor
1,2,3,5
Department of Information Engineering 4
Department of MCA
1,2,3,4,5
Veltech Hightech Dr.Rangarajan Dr. Sakunthala Engg. College, Chennai India
Abstract— Attribute-based encryption (ABE) can be used
for the encryption of data with attributes and logs. Instead of
encrypting each part of a log with the keys of all recipients,
it is possible to encrypt the log only with attributes which
match recipient’s attributes. This primitive can also be used
for broadcast encryption in order to decrease the number of
keys used. Here the access control will be given with the
keys and the attributes. The outsourcing computation cost
will be comparatively less when compared to the existing
system. The data will be shared between the two users if and
only if the key matches. In addition, for the first time, we
propose an outsourced ABE construction which provides
check ability of the outsourced computation results in an
efficient way. The performance analysis has been proven
this method to be more secured.
Key words: Attribute-based encryption, access control,
outsourcing computation, key issuing, check ability
I. INTRODUCTION
Attribute-based encryption (ABE) has created much
intention between the cloud users. For the first time in ABE
it has been introduced with a secured key sharing. Generally
in ABE system, user will have its private keys and
ciphertext along with its descriptive attributes only it
matches with the other user it reveals the data. Until now,
there are two kinds of ABE having been proposed: key-
policy attribute-based encryption (KP-ABE) and ciphertext-
policy attribute-based encryption (CP-ABE).
In KP-ABE, the sharing and the access policy is
assigned with the keys whereas, in CP-ABE, it is assigned
with ciphertext. Nowadays, security is being an obstacle to
the cloud services. Thus ABE will be the best policy to
securely outsource the data and will recover the data leaking
or sharing by the un trusted third party.
Nevertheless, one of the main efficiency drawbacks
of ABE is that the computational cost during decryption
phase grows with the complexity of the access formula.
Thus, before widely deployed, there is an increasing need to
improve the efficiency of ABE. To address this problem,
outsourced ABE, which provides a way to outsource
intensive computing task during decryption to CSP without
revealing data or private keys, was introduced [1], [2]. It has
a wide range of applications. For example, in the mobile
cloud computing consisting of mobile devices or sensors as
information collection nodes, user terminal (e.g., mobile
device) has limited computation ability to independently
complete basic encryption or decryption to protect sensitive
data residing in public cloud. Outsourced ABE allows user
to perform heavy decryption through ‘‘bor-rowing’’ the
computation resources from CSP. Therefore, in this
paradigm, the computation/storage intensive tasks can be
performed even by resource-constrained users.
Beyond the heavy decryption outsourced, we
observe that the attribute authority has to deal with a lot of
heavy computation in a scalable system. More precisely, the
attri-bute authority has to issue private keys to all users, but
yet generation of private key typically requires large
modular exponentiation computation, which grows linearly
with the complexity of the predicate formula. When a large
number of users call for their private keys, it may overload
the at-tribute authority. Moreover, key management
mechanism, key revocation in particular, is necessary in a
secure and scalable ABE system. In most of existing ABE
schemes, the revocation of any single private key requires
key-update at attribute authority for the remaining
unrevoked keys which share common attributes with the one
to be re-voked. All of these heavy tasks centralized at
authority side would make it an efficiency bottleneck in the
access control system.
II. CONTRIBUTION
Aiming at eliminating the most overhead computation at
both the attribute authority and the user sides, we propose an
outsourced ABE scheme not only supporting out-sourced
decryption but also enabling delegating key generation. In
this construction, we introduce a trivial policy controlled by
a default attribute and use an AND gate connecting the
trivial policy and user’s policy.
During key-issuing, attribute authority can
outsource computation through delegating the task of
generating partial private key for user’s policy to a key
generation service provider (KGSP) to reduce local
overhead. Moreover, the outsourced decryption is realized
by utilizing the idea of key blinding. More precisely, user
can send the blinded private key to a decryption service
provider (DSP) to perform partial decryption and do the
complete decryption at local. Following our technique,
constant efficiency is achieved at both attribute authority
and user sides.
In addition, we observe that when experiencing
com-mercial cloud computing services, the CSPs may be
selfish in order to save its computation or bandwidth, which
may cause results returned incorrectly. In order to deal with
this problem, we consider to realize checkability on results
returned from both KGSP and DSP, and provide a security
and functionality enhanced construction, which is provable
secure under the recent formulized refereed delegation of
computation (RDoC) model.
Out technique is to make a secret sharing on the
outsourcing key for KGSP and let k parallel KGSPs utilize
their individual share to generate partial private keys. After
that an additional key combina-tion phase is performed at
authority side to avoid malicious collaboration between at
most k _ 1 KGSPs and users. Moreover, we use the idea of
‘‘ringer’’ [3] and appending redundancy to fight against the
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 279
dishonest actions of KGSPs and DSP. As far as we know,
this is the first time considering the checkability of
outsourced ABE.
III. RELATED WORK
The notion of ABE, which was introduced as fuzzy identity-
based encryption in [1]., Two different and complementary
notions of ABE were defined in : KP-ABE and CP-ABE. A
construction of KP-ABE was provided in the same paper
[4], while the first CP-APE construction supporting tree-
based structure in generic group model is presented in [5].
Accordingly, several constructions support-ing for any kinds
of access structures were provided [6], [7] for practical
applications [8]. Concerning revocation of ABE, a
delegatable revocation is proposed in to achieve scalable
and fine-grained access control.
To reduce the load at local, it always desires to
deliver expensive computational tasks outside. Actually, the
problem that how to securely outsource different kinds of
expensive computations has drew considerable attention
from theoretical computer science community. [3] Presented
a framework for secure outsourcing of scientific
computations such as matrix multiplication and quadrature.
Nevertheless, the solution used the disguise technique and
thus leaded to leakage of private informa-tion. Atallah and
Li investigated the problem of computing the edit distance
between two sequences and presented an efficient protocol
to securely outsource se-quence comparison with two
servers. Furthermore, Benjamin and Atallah addressed the
problem of secure outsourcing for widely applicable linear
algebraic compu-tations. Nevertheless, the proposed
protocols required the expensive operations of
homomorphic encryption. In [9] further studied this problem
and gave improved protocols based on the so-called weak
secret hiding assumption. Recently, [7] presented efficient
mechanisms for secure outsourcing of linear programming
computation.
We note that though several schemes have been
intro-duced to securely outsource kinds of expensive
computa-tions, they are not suitable for reliving ABE
computational overhead of exponentiation at user side. To
achieve this goal, the traditional approach is to utilize
server-aided techniques [8], [9], [2]. However, previous
work are oriented to accelerating the speed of
exponentiation using untrusted servers. Directly utilizing
these techniques in ABE will not work efficiently. Another
approach might be to leverage recent general outsourcing
technique or del-egating computation [1] based on fully
homomorphic encryption, or interactive proof sys-tem.
However, Gentry [5] has shown that even for weak security
parameters on ‘‘bootstrapping’’ operation of the
homomorphic encryption, it would take at least 30 seconds
on a high performance machine. Therefore, even if the
privacy of the input and output can be preserved by uti-
lizing these general techniques, the computational over-head
is still huge and impractical.
Another several related work similar to us are [4],
[6], [3], [7]. In [3], a novel paradigm for outsourcing the
decryption of ABE is provided while in [4], [6] the authors
presented the ABE schemes which allow to securely
outsource both decryption and encryption to third party
service providers. Compared with our work, the two lack of
the consideration on the eliminating the overhead
computation at attribute authority. Additionally, we con-
sider a security and functionality enhanced construction
enabling checkability on returned results from CSPs.
Recently [8] proposed a concrete construction for ABE with
verifiable decryption, which achieves both security and
verifiability without random oracles. Their work appends a
redundancy with ciphertext and uses this redundancy for
correctness checking. We emphasize that compared with our
scheme their construction does not consider to offload the
overhead computation at authority by outsourcing key-
issuing.
IV. EXISTING SYSTEM
The existing Outsourced ABE solutions are able to offload
some intensive computing tasks to a third party the
verifiability of results returned from the third party has yet
to be addressed. The one of the main efficiency drawbacks
of ABE is that the computational cost during decryption
phase grows with the complexity of the access formula.
Thus, before widely deployed, there is an increasing need to
improve the efficiency of ABE. To address this problem,
outsourced ABE, which provides a way to outsource
intensive computing task during decryption to CSP without
revealing data or private keys, was introduced. When a large
number of users call for their private keys, it may overload
the attribute authority. Moreover, key management
mechanism, key revocation in particular, is necessary in a
secure and scalable ABE system. In most of existing ABE
schemes, the revocation of any single private key requires
key-update at attribute authority for the remaining
unrevoked keys which share common attributes with the one
to be re-voked.
V. PROPOSED SYSTEM
Aiming at eliminating the most overhead computation at
both the attribute authority and the user sides, we propose
an outsourced ABE scheme not only supporting outsourced
decryption but also enabling delegating key generation. In
this construction, we introduce a trivial policy controlled by
a default attribute and use an AND gate connecting the
trivial policy and user’s policy. During key-issuing, attribute
authority can outsource computation through delegating the
task of generating partial private key for user’s policy to a
key generation service provider (KGSP) to reduce local
overhead. Moreover, the outsourced decryption is realized
by utilizing the idea of key blinding. More precisely, user
can send the blinded private key to a decryption service
provider (DSP) to perform partial decryption and do the
complete decryption at local. Following our technique,
constant efficiency is achieved at both attribute authority
and user sides. In order to deal with this problem, we
consider to realize checkability on results returned from
both KGSP and DSP, and provide a security and
functionality enhanced construction.
VI. MODULES
 Registration and authority key generation
 Apply Privilege and KGSP key
 Uploading & Downloading
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 280
A. Registration and Authority Key Generation:
In this module, user will register their details into the cloud
manager. User has to fill all their own personal details,
based on the user attributes only key will be generated. Once
user registered completed, details will be sent to the cloud
for further processing. The Attribute Authority (AA) is to
provide partial key transformation based on users attribute.
Based on the user attributes AA provide key. Here ABE
scheme will be applied for key generation. After AA
generate key, then only user can login and do their further
process without attribute key user can’t login
B. Apply Privilege and KGSP Key:
In this module user has to set the access policy for their own
content. After user got permission from AA they login into
the application for setting privilege. Reason for setting
privilege is, who are all person will seen my uploaded
content. Only the authorized person only can download the
content and use it. For this reason only uploaded user set the
privilege for the content. User set privilege based on their
own attributes and also other attributes that they are not
specified in the registration. Once user applied privilege,
those information must be sent to the key generation service
provider (KGSP). At KGSP, generate a partial
transformation key based on the user’s attribute set. After
KGSP generate key, those key can be stored in the cloud
database. Based on the AA key and KGSP key, cloud
generate a user secret key for encrypt the uploaded content.
So, to outsource private key generation, we utilize a hybrid
key policy Policy=Policy (KGSP)^Policy(AA) where ^ is an
AND gate connecting two sub-policies Policy(KGSP) and
Policy(AA).
C. Uploading & Downloading:
In this module user upload own content and other
authorized user will download the content. Once user got
private key from cloud, they encrypt the upload content
based on their own private key. Once content encrypted, the
cipher text content must be stored in the cloud database. All
the uploaded files are maintained by cloud manager. If
another user logged into the application they requesting the
file for download. For download user has to enter the correct
attribute set and signature for the particular content. If the
user entered correct attribute set and signature means, cloud
allowed to download the file. Otherwise cloud doesn’t allow
user for download. So every user has to enter the correct
signature and attribute set name for content download.
Signature has been generated by Attribute Authority based
on the attribute partial key. So for any outsource the content
in the cloud means, here we provide the security. For every
outsource here we specified the service provider for check
ability.
VII. ARCHITECTURE DIAGRAM
VIII. KEY GENERATION GRAPH
A. Performance Variation in Keys
B. Key Generations
IX. CONCLUSION:
We provided an ABE system with the secured outsourcing
provided by KGSP and DSP providers. In addition, we
provide a trust-reduced construction with two KGSPs which
is secure under recently formulized RDoC model. Therefore
checkability is supported by this construction. The security
of proposed schemes have been analyzed and given in this
paper. Experimental results demonstrate that our
constructions are efficient and practical
REFERENCES
[1] A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based
Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT,
LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005,
pp. 457-473, Springer-Verlag.
[2] D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data
Dissemination in Delay Tolerant Networks,’’ IEEE
Trans. Parallel Distrib. Syst.
http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.
221
[3] M. Green, S. Hohenberger, and B. Waters,
‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in
Proc. 20th USENIX Conf. SEC, 2011, p. 34.
[4] Z. Zhou and D. Huang, ‘‘Efficient and Secure Data
Storage Operations for Mobile Cloud Computing,’’ in
Cryptology ePrint Archive, Report 2011/185, 2011.
[5] P. Golle and I. Mironov, ‘‘Uncheatable Distributed
Computations,’’ in Proc. Conf. Topics Cryptol., CT-
RSA, 2001, pp. 425-440.
[6] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
‘‘Attribute-Based Encryption for Fine-Grained Access
0%
20%
40%
60%
80%
100%
ATTRIBUTE
1
ATTRIBUTE
2
ATTRIBUTE
3
ATTRIBUTE
4
0
1
2
3
4
5
AA KGSP DSP SSP
Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud
(IJSRD/Vol. 3/Issue 10/2015/067)
All rights reserved by www.ijsrd.com 281
Control of Encrypted Data,’’ in Proc. 13th ACM Conf.
Comput. Commun. Security, 2006, pp. 89-98.
[7] J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext-
Policy Attribute-Based Encryption,’’ in Proc. IEEE
Symp. Security Privacy, May 2007, pp. 321-334.
[8] L. Cheung and C. Newport, ‘‘Provably Secure
Ciphertext Policy ABE,’’ in Proc. 14th ACM Conf.
CCS, 2007, pp. 456-465.
[9] T. Nishide, K. Yoneyama, andK. Ohta, ‘‘Attribute-
Based Encryption with Partially Hidden Encryptor-
Specified Access Structures,’’ in Proc. Appl. Cryptogr.
Netw. Security, LNCS 5037, S. Bellovin, R. Gennaro,
A. Keromytis, and M. Yung, Eds., Berlin, Germany,
2008, pp. 111-129, Springer-Verlag.
[10]F. Han, J. Qin, H. Zhao, and J. Hu, ‘‘A General
Transformation from KP-ABE to Searchable
Encryption,’’ Future Gen. Comput. Syst., vol. 30, pp.
107-115, Jan. 2014.

More Related Content

What's hot

Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET Journal
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud ComputingIdentity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing1crore projects
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...JPINFOTECH JAYAPRAKASH
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...CSCJournals
 

What's hot (18)

Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
F01113945
F01113945F01113945
F01113945
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud ComputingIdentity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 

Viewers also liked

An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...IJSRD
 
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...IJSRD
 
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...IJSRD
 
Development of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLCDevelopment of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLCIJSRD
 
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...IJSRD
 
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...IJSRD
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...IJSRD
 
A Comparative Study of Sensors for Road Traffic Density Measurement
A Comparative Study of Sensors for Road Traffic Density MeasurementA Comparative Study of Sensors for Road Traffic Density Measurement
A Comparative Study of Sensors for Road Traffic Density MeasurementIJSRD
 
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...IJSRD
 

Viewers also liked (9)

An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
An Experimental Analysis to Determine Ultimate Tensile Strength of Jute Reinf...
 
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
Circular Slot Loaded Rectangular Microstrip Patch Antenna For WLAN / WiMax Ap...
 
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
Seasonal Variations and Diversity of Marine Diatoms of Jegathapattinam and Ka...
 
Development of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLCDevelopment of Balloon Forming Machine and its Control Using PLC
Development of Balloon Forming Machine and its Control Using PLC
 
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using T...
 
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
Experimental Study on Structural Behaviour of Concrete by Varying Percentage ...
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
 
A Comparative Study of Sensors for Road Traffic Density Measurement
A Comparative Study of Sensors for Road Traffic Density MeasurementA Comparative Study of Sensors for Road Traffic Density Measurement
A Comparative Study of Sensors for Road Traffic Density Measurement
 
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
A Survey on the Performance of the Various MPPT Techniques of Standalone PV G...
 

Similar to Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...IEEEGLOBALSOFTTECHNOLOGIES
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...IEEEGLOBALSOFTTECHNOLOGIES
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewIRJET Journal
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 

Similar to Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud (20)

IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
C04932125
C04932125C04932125
C04932125
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Data Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A ReviewData Access Control Schemes in Cloud Computing: A Review
Data Access Control Schemes in Cloud Computing: A Review
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Identifying the Performance Efficiency Of Attribute Based Encryption With Secured Resource in Cloud

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 278 Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud J.Velmurugan1 C.Chanravathy2 P.Vinothkumar3 S.K.Manigandan4 D.Ramya5 1,2,3,4,5 Assistant Professor 1,2,3,5 Department of Information Engineering 4 Department of MCA 1,2,3,4,5 Veltech Hightech Dr.Rangarajan Dr. Sakunthala Engg. College, Chennai India Abstract— Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured. Key words: Attribute-based encryption, access control, outsourcing computation, key issuing, check ability I. INTRODUCTION Attribute-based encryption (ABE) has created much intention between the cloud users. For the first time in ABE it has been introduced with a secured key sharing. Generally in ABE system, user will have its private keys and ciphertext along with its descriptive attributes only it matches with the other user it reveals the data. Until now, there are two kinds of ABE having been proposed: key- policy attribute-based encryption (KP-ABE) and ciphertext- policy attribute-based encryption (CP-ABE). In KP-ABE, the sharing and the access policy is assigned with the keys whereas, in CP-ABE, it is assigned with ciphertext. Nowadays, security is being an obstacle to the cloud services. Thus ABE will be the best policy to securely outsource the data and will recover the data leaking or sharing by the un trusted third party. Nevertheless, one of the main efficiency drawbacks of ABE is that the computational cost during decryption phase grows with the complexity of the access formula. Thus, before widely deployed, there is an increasing need to improve the efficiency of ABE. To address this problem, outsourced ABE, which provides a way to outsource intensive computing task during decryption to CSP without revealing data or private keys, was introduced [1], [2]. It has a wide range of applications. For example, in the mobile cloud computing consisting of mobile devices or sensors as information collection nodes, user terminal (e.g., mobile device) has limited computation ability to independently complete basic encryption or decryption to protect sensitive data residing in public cloud. Outsourced ABE allows user to perform heavy decryption through ‘‘bor-rowing’’ the computation resources from CSP. Therefore, in this paradigm, the computation/storage intensive tasks can be performed even by resource-constrained users. Beyond the heavy decryption outsourced, we observe that the attribute authority has to deal with a lot of heavy computation in a scalable system. More precisely, the attri-bute authority has to issue private keys to all users, but yet generation of private key typically requires large modular exponentiation computation, which grows linearly with the complexity of the predicate formula. When a large number of users call for their private keys, it may overload the at-tribute authority. Moreover, key management mechanism, key revocation in particular, is necessary in a secure and scalable ABE system. In most of existing ABE schemes, the revocation of any single private key requires key-update at attribute authority for the remaining unrevoked keys which share common attributes with the one to be re-voked. All of these heavy tasks centralized at authority side would make it an efficiency bottleneck in the access control system. II. CONTRIBUTION Aiming at eliminating the most overhead computation at both the attribute authority and the user sides, we propose an outsourced ABE scheme not only supporting out-sourced decryption but also enabling delegating key generation. In this construction, we introduce a trivial policy controlled by a default attribute and use an AND gate connecting the trivial policy and user’s policy. During key-issuing, attribute authority can outsource computation through delegating the task of generating partial private key for user’s policy to a key generation service provider (KGSP) to reduce local overhead. Moreover, the outsourced decryption is realized by utilizing the idea of key blinding. More precisely, user can send the blinded private key to a decryption service provider (DSP) to perform partial decryption and do the complete decryption at local. Following our technique, constant efficiency is achieved at both attribute authority and user sides. In addition, we observe that when experiencing com-mercial cloud computing services, the CSPs may be selfish in order to save its computation or bandwidth, which may cause results returned incorrectly. In order to deal with this problem, we consider to realize checkability on results returned from both KGSP and DSP, and provide a security and functionality enhanced construction, which is provable secure under the recent formulized refereed delegation of computation (RDoC) model. Out technique is to make a secret sharing on the outsourcing key for KGSP and let k parallel KGSPs utilize their individual share to generate partial private keys. After that an additional key combina-tion phase is performed at authority side to avoid malicious collaboration between at most k _ 1 KGSPs and users. Moreover, we use the idea of ‘‘ringer’’ [3] and appending redundancy to fight against the
  • 2. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 279 dishonest actions of KGSPs and DSP. As far as we know, this is the first time considering the checkability of outsourced ABE. III. RELATED WORK The notion of ABE, which was introduced as fuzzy identity- based encryption in [1]., Two different and complementary notions of ABE were defined in : KP-ABE and CP-ABE. A construction of KP-ABE was provided in the same paper [4], while the first CP-APE construction supporting tree- based structure in generic group model is presented in [5]. Accordingly, several constructions support-ing for any kinds of access structures were provided [6], [7] for practical applications [8]. Concerning revocation of ABE, a delegatable revocation is proposed in to achieve scalable and fine-grained access control. To reduce the load at local, it always desires to deliver expensive computational tasks outside. Actually, the problem that how to securely outsource different kinds of expensive computations has drew considerable attention from theoretical computer science community. [3] Presented a framework for secure outsourcing of scientific computations such as matrix multiplication and quadrature. Nevertheless, the solution used the disguise technique and thus leaded to leakage of private informa-tion. Atallah and Li investigated the problem of computing the edit distance between two sequences and presented an efficient protocol to securely outsource se-quence comparison with two servers. Furthermore, Benjamin and Atallah addressed the problem of secure outsourcing for widely applicable linear algebraic compu-tations. Nevertheless, the proposed protocols required the expensive operations of homomorphic encryption. In [9] further studied this problem and gave improved protocols based on the so-called weak secret hiding assumption. Recently, [7] presented efficient mechanisms for secure outsourcing of linear programming computation. We note that though several schemes have been intro-duced to securely outsource kinds of expensive computa-tions, they are not suitable for reliving ABE computational overhead of exponentiation at user side. To achieve this goal, the traditional approach is to utilize server-aided techniques [8], [9], [2]. However, previous work are oriented to accelerating the speed of exponentiation using untrusted servers. Directly utilizing these techniques in ABE will not work efficiently. Another approach might be to leverage recent general outsourcing technique or del-egating computation [1] based on fully homomorphic encryption, or interactive proof sys-tem. However, Gentry [5] has shown that even for weak security parameters on ‘‘bootstrapping’’ operation of the homomorphic encryption, it would take at least 30 seconds on a high performance machine. Therefore, even if the privacy of the input and output can be preserved by uti- lizing these general techniques, the computational over-head is still huge and impractical. Another several related work similar to us are [4], [6], [3], [7]. In [3], a novel paradigm for outsourcing the decryption of ABE is provided while in [4], [6] the authors presented the ABE schemes which allow to securely outsource both decryption and encryption to third party service providers. Compared with our work, the two lack of the consideration on the eliminating the overhead computation at attribute authority. Additionally, we con- sider a security and functionality enhanced construction enabling checkability on returned results from CSPs. Recently [8] proposed a concrete construction for ABE with verifiable decryption, which achieves both security and verifiability without random oracles. Their work appends a redundancy with ciphertext and uses this redundancy for correctness checking. We emphasize that compared with our scheme their construction does not consider to offload the overhead computation at authority by outsourcing key- issuing. IV. EXISTING SYSTEM The existing Outsourced ABE solutions are able to offload some intensive computing tasks to a third party the verifiability of results returned from the third party has yet to be addressed. The one of the main efficiency drawbacks of ABE is that the computational cost during decryption phase grows with the complexity of the access formula. Thus, before widely deployed, there is an increasing need to improve the efficiency of ABE. To address this problem, outsourced ABE, which provides a way to outsource intensive computing task during decryption to CSP without revealing data or private keys, was introduced. When a large number of users call for their private keys, it may overload the attribute authority. Moreover, key management mechanism, key revocation in particular, is necessary in a secure and scalable ABE system. In most of existing ABE schemes, the revocation of any single private key requires key-update at attribute authority for the remaining unrevoked keys which share common attributes with the one to be re-voked. V. PROPOSED SYSTEM Aiming at eliminating the most overhead computation at both the attribute authority and the user sides, we propose an outsourced ABE scheme not only supporting outsourced decryption but also enabling delegating key generation. In this construction, we introduce a trivial policy controlled by a default attribute and use an AND gate connecting the trivial policy and user’s policy. During key-issuing, attribute authority can outsource computation through delegating the task of generating partial private key for user’s policy to a key generation service provider (KGSP) to reduce local overhead. Moreover, the outsourced decryption is realized by utilizing the idea of key blinding. More precisely, user can send the blinded private key to a decryption service provider (DSP) to perform partial decryption and do the complete decryption at local. Following our technique, constant efficiency is achieved at both attribute authority and user sides. In order to deal with this problem, we consider to realize checkability on results returned from both KGSP and DSP, and provide a security and functionality enhanced construction. VI. MODULES  Registration and authority key generation  Apply Privilege and KGSP key  Uploading & Downloading
  • 3. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 280 A. Registration and Authority Key Generation: In this module, user will register their details into the cloud manager. User has to fill all their own personal details, based on the user attributes only key will be generated. Once user registered completed, details will be sent to the cloud for further processing. The Attribute Authority (AA) is to provide partial key transformation based on users attribute. Based on the user attributes AA provide key. Here ABE scheme will be applied for key generation. After AA generate key, then only user can login and do their further process without attribute key user can’t login B. Apply Privilege and KGSP Key: In this module user has to set the access policy for their own content. After user got permission from AA they login into the application for setting privilege. Reason for setting privilege is, who are all person will seen my uploaded content. Only the authorized person only can download the content and use it. For this reason only uploaded user set the privilege for the content. User set privilege based on their own attributes and also other attributes that they are not specified in the registration. Once user applied privilege, those information must be sent to the key generation service provider (KGSP). At KGSP, generate a partial transformation key based on the user’s attribute set. After KGSP generate key, those key can be stored in the cloud database. Based on the AA key and KGSP key, cloud generate a user secret key for encrypt the uploaded content. So, to outsource private key generation, we utilize a hybrid key policy Policy=Policy (KGSP)^Policy(AA) where ^ is an AND gate connecting two sub-policies Policy(KGSP) and Policy(AA). C. Uploading & Downloading: In this module user upload own content and other authorized user will download the content. Once user got private key from cloud, they encrypt the upload content based on their own private key. Once content encrypted, the cipher text content must be stored in the cloud database. All the uploaded files are maintained by cloud manager. If another user logged into the application they requesting the file for download. For download user has to enter the correct attribute set and signature for the particular content. If the user entered correct attribute set and signature means, cloud allowed to download the file. Otherwise cloud doesn’t allow user for download. So every user has to enter the correct signature and attribute set name for content download. Signature has been generated by Attribute Authority based on the attribute partial key. So for any outsource the content in the cloud means, here we provide the security. For every outsource here we specified the service provider for check ability. VII. ARCHITECTURE DIAGRAM VIII. KEY GENERATION GRAPH A. Performance Variation in Keys B. Key Generations IX. CONCLUSION: We provided an ABE system with the secured outsourcing provided by KGSP and DSP providers. In addition, we provide a trust-reduced construction with two KGSPs which is secure under recently formulized RDoC model. Therefore checkability is supported by this construction. The security of proposed schemes have been analyzed and given in this paper. Experimental results demonstrate that our constructions are efficient and practical REFERENCES [1] A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer-Verlag. [2] D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data Dissemination in Delay Tolerant Networks,’’ IEEE Trans. Parallel Distrib. Syst. http://doi.ieeecomputersociety.org/10.1109/TPDS.2013. 221 [3] M. Green, S. Hohenberger, and B. Waters, ‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in Proc. 20th USENIX Conf. SEC, 2011, p. 34. [4] Z. Zhou and D. Huang, ‘‘Efficient and Secure Data Storage Operations for Mobile Cloud Computing,’’ in Cryptology ePrint Archive, Report 2011/185, 2011. [5] P. Golle and I. Mironov, ‘‘Uncheatable Distributed Computations,’’ in Proc. Conf. Topics Cryptol., CT- RSA, 2001, pp. 425-440. [6] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ‘‘Attribute-Based Encryption for Fine-Grained Access 0% 20% 40% 60% 80% 100% ATTRIBUTE 1 ATTRIBUTE 2 ATTRIBUTE 3 ATTRIBUTE 4 0 1 2 3 4 5 AA KGSP DSP SSP
  • 4. Identifying the Performance Efficiency of Attribute Based Encryption with Secured Resource in Cloud (IJSRD/Vol. 3/Issue 10/2015/067) All rights reserved by www.ijsrd.com 281 Control of Encrypted Data,’’ in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98. [7] J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext- Policy Attribute-Based Encryption,’’ in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334. [8] L. Cheung and C. Newport, ‘‘Provably Secure Ciphertext Policy ABE,’’ in Proc. 14th ACM Conf. CCS, 2007, pp. 456-465. [9] T. Nishide, K. Yoneyama, andK. Ohta, ‘‘Attribute- Based Encryption with Partially Hidden Encryptor- Specified Access Structures,’’ in Proc. Appl. Cryptogr. Netw. Security, LNCS 5037, S. Bellovin, R. Gennaro, A. Keromytis, and M. Yung, Eds., Berlin, Germany, 2008, pp. 111-129, Springer-Verlag. [10]F. Han, J. Qin, H. Zhao, and J. Hu, ‘‘A General Transformation from KP-ABE to Searchable Encryption,’’ Future Gen. Comput. Syst., vol. 30, pp. 107-115, Jan. 2014.