MC

Current Trends in Science and Technology

an Open Access Publication ISSN: 0976-9730 | 0976-9498

Computer Science

A circuit hybrid attribute based encryption of data with fragmentation for increasing ideal performance and security in cloud computing

Roma J. Ahuja , Kalyani B. Hailkar, Saurabh V.Kale, Prof A.A.Khatri
Department of Computer Engg, Jaihind College of Engineering, Kuran. (E-mail: ahujaroam1096@gmail.com). Pune, Maharashtra, India. 2Department of Computer Engg, Jaihind College of Engineering, Kuran. (E-mail: hailkarkalyani@gmail.com). Pune, Maharashtra, India. 3Department of Computer Engg, Jaihind College of Engineering, Kuran. (E-mail: kalesaurabh23@gmail.com). Pune, Maharashtra, India.
Online First: February 28, 2018
| Google Scholar

Abstract

Cloud computing is innovation that uses advanced computational power and improved storage capacities. Cloud computing offer the number of significant advantages. One of the main advantage of cloud computing is pay-as-per-use, which means according to the use of service the customer has to pay. Where the prime disadvantage of cloud computing is achieving security to the data which is store in cloud. The data compromise may occur due to attacks by other users and node within cloud. In this paper, We propose Hd-ABE (Hybrid Attribute Based Encryption ) In which data owner should set the access structure of attributes with encrypted data , The user only whose attributes are match with access structure of owner only that user can decrypt the data. To secure data which is store in single node with in cloud we use DROPS (Division and Replication of Data in the cloud for Optimal Performance and Security) methodology, in which we divide the file into fragments, and replicate the fragmented data over the cloud.

  Submitted
Feb 28, 2018
Published
Feb 28, 2018
Abstract Views
74
PDF Downloads
65
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

References

1. Adi Shamir ,”Identity Based Cryptosystem and signification schemes”. 2. A. Sahai and B. Waters, "Fuzzy identity based encryption", Proc. 30th Annu. Int. Conf. Theory Appl. Cryptograph. Techn, pp. 457-473, 2005 3. N.krishna L.Bhavani “HASBE A Hierarchical Attribute Set Based Encryption For Flexible Scalable And 4. Fine Grained Access Control In Cloud Computing” International Journal of Computer & Organization Trends–Volume 3 Issue 9 – Oct 2013. 5. Parmar Vipul Kumar, Rajanikanth Aluvalu” Key-Policy Attribute Based Encryption(KP-ABE)”,International Journal of Innovative and Emerging Research in Engineering Volume 2, Issue 2, 2015. 6. B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. 14th Int. Conf. Practice Theory Public Key Cryptograph. Conf. Public Key Cryptograph, 2011. 7. Stefan G.Weber,” Designing a Hybrid attribute-Based encryption scheme supporting Dynamic Attribute”,in Proc. 27th Int. Cryptol.Conf.,2016 8. P.Anand, R.Bharath, C.Ganapathy, S. Sam Victor,”SECURE DYNAMIC FRAGMENT AND REPLICA ALLOCATION IN CLOUD STORAGE”, International Journal of Computer Informatics & Technological Engineering Volume (3) Issue (3) March 2016
Downloads

Downloads

Download data is not yet available.

References

1. Adi Shamir ,”Identity Based Cryptosystem and signification schemes”.
2. A. Sahai and B. Waters, "Fuzzy identity based encryption", Proc. 30th Annu. Int. Conf. Theory Appl. Cryptograph. Techn, pp. 457-473, 2005
3. N.krishna L.Bhavani “HASBE A Hierarchical Attribute Set Based Encryption For Flexible Scalable And 4. Fine Grained Access Control In Cloud Computing” International Journal of Computer & Organization Trends–Volume 3 Issue 9 – Oct 2013.
5. Parmar Vipul Kumar, Rajanikanth Aluvalu” Key-Policy Attribute Based Encryption(KP-ABE)”,International Journal of Innovative and Emerging Research in Engineering Volume 2, Issue 2, 2015.
6. B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Proc. 14th Int. Conf. Practice Theory Public Key Cryptograph. Conf. Public Key Cryptograph, 2011.
7. Stefan G.Weber,” Designing a Hybrid attribute-Based encryption scheme supporting Dynamic Attribute”,in Proc. 27th Int. Cryptol.Conf.,2016
8. P.Anand, R.Bharath, C.Ganapathy, S. Sam Victor,”SECURE DYNAMIC FRAGMENT AND REPLICA ALLOCATION IN CLOUD STORAGE”, International Journal of Computer Informatics & Technological Engineering Volume (3) Issue (3) March 2016
No Supplimentary Material available for this article.

Statistics from Altmetric.com

Statistics from Dimensions.ai

Statistics from PlumX


Related Articles

Related Authors

 



In Google Scholar

In International Journal of Current Trends in Science and Technology

In Google Scholar

 
  • Roma J. Ahuja , Kalyani B. Hailkar, Saurabh V.Kale, Prof A.A.Khatri

  • INDEXING AND ABSTRACTING