Open Access Open Access  Restricted Access Subscription Access

Data Recovery in Cloud with Security and Protection Confirmation

Aafiya Thahaseen, A, Mohamed Ismail. S, Sharuk .P

Abstract


Distributed computing give us an administration which is utilize and pay on-request benefits, in this manner the client can have different alternatives for information preparing framework. Cloud administrations make a characteristic test information protection and security. This is a direct result of weakness to assault, multi-occupancy and absence of client control.

Thus, a secure encryption system with low calculation is required. Quality based encryption (ABE) innovation has been utilized to configuration fine-grained get to control framework, which gives one great strategy to comprehend the security issues in cloud setting. Be that as it may, the calculation cost and figure content size in most ABE plans develop with the multifaceted nature of the entrance strategy. Outsourced ABE(OABE) with fine-grained get to control framework can generally lessen the calculation cost for clients who need to get to encoded information put away in cloud by outsourcing the substantial calculation to cloud specialist co-op (CSP).

However, as the amount of encrypted files stored in cloud is becoming  very huge, which will hinder efficient query processing. To deal with above problem, we present a new cryptographic primitive called attribute-based encryption scheme with outsourcing key-issuing and outsourcing decryption, which can implement keyword search function (KSF-OABE). The proposed KSF-OABE scheme is proved secure against chosen-plaintext attack (CPA). CSP performs partial decryption task delegated by data user without knowing anything about the plaintext. Moreover, the CSP can perform encrypted keyword search without knowing anything about the keywords embedded in trapdoor. Here we used the algorithm is Set-up Algorithm.

 

 


Full Text:

PDF

References


S. Pearson, Y. Shen and M. Mowbray, A Privacy Manager for Cloud Computing., Proc. First International Conference Cloud Computing (CloudCom ’09), M. Gilje-Jaatun, G. Zhao and C. Rong, eds., LNCS 5931, Berlin:Springer-Verlag,.2009.90-106p.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption.

EUROCRYPT’05,LNCS.2005.3494:457-473p.

V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data, Proc. 13th ACM Conference on Computer and Communications Security (CCS ’06) ,2006, doi:10.1145/ 1180405.1180418. 89-98p

J.W. Li, C.F. Jia, J. Li and X.F. Chen, Outsourcing Encryption of Attribute- Based Encryption with Mapreduce. Proc. 14th International Conferenceon Information andCommunications Security (ICICS ’12), LNCS 7618, Berlin: Springer-Verlag,2012:191- 201p. doi: 10.1007/ 978-3-642- 34129-8_17

A. Lewko, T. Okamoto, A. Sahai, K. Takashima and B. Waters. Attribute- Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT ’10, H. Gilbert, ed.,LNCS 6110, Berlin: Springer-Verlag, 2010: 62-91p

J.G. Han, W. Susilo, Y. Mu and J. Yan, Privacy-Preserving Decentralized Key-Policy Attribute- Based Encryption. IEEE Transactions on Parallel and Distributed Systems.2012.23(11):2150- 2162p.doi: 10.1109/ TPDS.2012.50.

T. Okamoto and K. Takashima. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. CRYPTO ’10, T. Rabin, ed.,LNCS6223, Berlin: Springer-Verlag, ,2010:91- 208p.


Refbacks

  • There are currently no refbacks.