SlideShare uma empresa Scribd logo
1 de 5
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
ABSTRACT:
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The
shared data files generally have the characteristic of multilevel hierarchy, particularly in the area
of healthcare and the military. However, the hierarchy structure of shared files has not been
explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme
is proposed in cloud computing. The layered access structures are integrated into a single access
structure, and then, the hierarchical files are encrypted with the integrated access structure. The
ciphertext components related to attributes could be shared by the files. Therefore, both
ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is
proved to be secure under the standard assumption. Experimental simulation shows that the
proposed scheme is highly efficient in terms of encryption and decryption. With the number of
the files increasing, the advantages of our scheme become more and more conspicuous.
EXISTING SYSTEM:
Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was the
prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.Since Gentry and
Silverberg proposed the first notion of hierarchical encryption scheme, many hierarchical CP-
ABE schemes have been proposed. For example, Wang et al. proposed a hierarchical ABE
scheme by combining the hierarchical IBE and CP-ABE.Wan et al. proposed hierarchical ABE
scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret key is linear with
the order of the attribute set. A ciphertextpolicy hierarchical ABE scheme with short ciphertext is
also studied.In these schemes, the parent authorization domain governs its child authorization
domains and a top-level authorization domain creates secret key of the next-level domain. The
work of key creation is distributed on multiple authorization domains and the burden of key
authority center is lightened.
DISADVANTAGES OF EXISTING SYSTEM:
In Existing System time and cost for encryption is high.
No any special multiple hierarchical files are used.
Decryption system time and computation cost are very high.
PROPOSED SYSTEM:
In this study, an efficient encryption scheme based on layered model of the access structure is
proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE,
for short). FH-CP-ABE extends typical CP-ABE with a hierarchical structure of access policy, so
as to achieve simple, flexible and fine-grained access control.The contributions of our scheme
are three aspects.Firstly, we propose the layered model of access structure to solve the problem
of multiple hierarchical files sharing. The files are encrypted with one integrated access
structure. Secondly, we also formally prove the security of FH-CP-ABE scheme that can
successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie-Hellman
(DBDH) assumption. Thirdly, we conduct and implement comprehensive experiment for FH-CP-
ABE scheme, and the simulation results show that FH-CP-ABE has low storage cost and
computation complexity in terms of encryption and decryption.
ADVANTAGES OF PROPOSED SYSTEM:
CP-ABE feasible schemes which has much more flexibility and is more suitable for general
applicationsMultiple hierarchical files sharing are resolved using layered model of access
structure.In proposed system both ciphertext storage and time cost of encryption are saved.The
proposed scheme has an advantage that users can decrypt all authorization files by computing
secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt
multiple files.The computation cost of decryption can also be reduced if users need to decrypt
multiple files at the same time.
SYSTEM ARCHITECTURE:
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Algorithm:
The FH-CP-ABE scheme consists of below operations:
1) (PK, MSK) ← Setup(1κ):
The probabilistic operation takes a security parameter κ as input and outputs public key PK and
master secret key MSK.
2) (SK) ← KeyGen(P K, M SK, S):
The operation inputs PK, MSK and a set of attributes S and creates a secret key SK.
3) File Encrypted Data ← FileEncrypt(FileData m, ContentKey ck):
The operation inputs File Data m and Content Key ck and using of content key ck we can
encrypt the file data and store in cloud.
4) (CT) ← Encrypt (PK, ck, A):
The operation inputs PK, ck = {ck1... ckk} and a hierarchical access tree A. At last, it creates an
integrated ciphertext of content keys CT.
5) (cki(i ∈ [1, k])) ← Decrypt(P K, CT, SK):
The algorithm inputs PK, CT which includes an integrated access structure A, SK described by a
set of attributes S. If the S matches part of A, some content keys cki(i ∈ [1, k]) can be decrypted.
If it matches the whole A, all the content keys can be decrypted. Then, the corresponding files
mi(i ∈ [1, k]) will be decrypted with the content keys by the symmetric decryption algorithm.
About Cloud Technologies:
Cloud Technologies is one of the best software development company. Which is providing
IEEE, real time projects and training for M-Tech, B-Tech, ME, BE, BCA, MCA students
and freshers in Hyderabad Ameerpet. Our aim is to ensure you receive the best commanding on
subject.
SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 1 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Java (1.7/1.8)
Web Technologies : Html, Html-5, JavaScript, CSS.
Web Server : Tomcat 7/8
Server side Lang : J2EE
Database : My SQL5.5

Mais conteúdo relacionado

Mais procurados

Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
Thivya Devaraj
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 

Mais procurados (20)

File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Secry poster
Secry posterSecry poster
Secry poster
 
G018143943
G018143943G018143943
G018143943
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
 
Named Data Networking
Named Data NetworkingNamed Data Networking
Named Data Networking
 
Access Control & Encryption In Cloud Environments
Access Control & Encryption In Cloud EnvironmentsAccess Control & Encryption In Cloud Environments
Access Control & Encryption In Cloud Environments
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
 

Semelhante a An efficient file hierarchy attribute based

Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 

Semelhante a An efficient file hierarchy attribute based (20)

Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Tees an efficient search scheme over
Tees an efficient search scheme overTees an efficient search scheme over
Tees an efficient search scheme over
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

An efficient file hierarchy attribute based

  • 1. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing ABSTRACT: Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous. EXISTING SYSTEM: Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme, many hierarchical CP- ABE schemes have been proposed. For example, Wang et al. proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE.Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret key is linear with the order of the attribute set. A ciphertextpolicy hierarchical ABE scheme with short ciphertext is also studied.In these schemes, the parent authorization domain governs its child authorization domains and a top-level authorization domain creates secret key of the next-level domain. The work of key creation is distributed on multiple authorization domains and the burden of key authority center is lightened.
  • 2. DISADVANTAGES OF EXISTING SYSTEM: In Existing System time and cost for encryption is high. No any special multiple hierarchical files are used. Decryption system time and computation cost are very high. PROPOSED SYSTEM: In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control.The contributions of our scheme are three aspects.Firstly, we propose the layered model of access structure to solve the problem of multiple hierarchical files sharing. The files are encrypted with one integrated access structure. Secondly, we also formally prove the security of FH-CP-ABE scheme that can successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. Thirdly, we conduct and implement comprehensive experiment for FH-CP- ABE scheme, and the simulation results show that FH-CP-ABE has low storage cost and computation complexity in terms of encryption and decryption. ADVANTAGES OF PROPOSED SYSTEM: CP-ABE feasible schemes which has much more flexibility and is more suitable for general applicationsMultiple hierarchical files sharing are resolved using layered model of access structure.In proposed system both ciphertext storage and time cost of encryption are saved.The proposed scheme has an advantage that users can decrypt all authorization files by computing secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt multiple files.The computation cost of decryption can also be reduced if users need to decrypt multiple files at the same time.
  • 3. SYSTEM ARCHITECTURE: An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Algorithm: The FH-CP-ABE scheme consists of below operations: 1) (PK, MSK) ← Setup(1κ): The probabilistic operation takes a security parameter κ as input and outputs public key PK and master secret key MSK. 2) (SK) ← KeyGen(P K, M SK, S): The operation inputs PK, MSK and a set of attributes S and creates a secret key SK. 3) File Encrypted Data ← FileEncrypt(FileData m, ContentKey ck): The operation inputs File Data m and Content Key ck and using of content key ck we can encrypt the file data and store in cloud. 4) (CT) ← Encrypt (PK, ck, A):
  • 4. The operation inputs PK, ck = {ck1... ckk} and a hierarchical access tree A. At last, it creates an integrated ciphertext of content keys CT. 5) (cki(i ∈ [1, k])) ← Decrypt(P K, CT, SK): The algorithm inputs PK, CT which includes an integrated access structure A, SK described by a set of attributes S. If the S matches part of A, some content keys cki(i ∈ [1, k]) can be decrypted. If it matches the whole A, all the content keys can be decrypted. Then, the corresponding files mi(i ∈ [1, k]) will be decrypted with the content keys by the symmetric decryption algorithm. About Cloud Technologies: Cloud Technologies is one of the best software development company. Which is providing IEEE, real time projects and training for M-Tech, B-Tech, ME, BE, BCA, MCA students and freshers in Hyderabad Ameerpet. Our aim is to ensure you receive the best commanding on subject.
  • 5. SYSTEM CONFIGURATION: Hardware requirements: Processer : Any Update Processer Ram : Min 1 GB Hard Disk : Min 100 GB Software requirements: Operating System : Windows family Technology : Java (1.7/1.8) Web Technologies : Html, Html-5, JavaScript, CSS. Web Server : Tomcat 7/8 Server side Lang : J2EE Database : My SQL5.5