Final_attribute based encryption in cloud with significant reduction of computation time.
1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Jnana Sangama, Belgaum, Karnataka-590 014.
“ATTRIBUTE-BASED ENCRYPTION IN CLOUD WITH
SIGNIFICANT REDUCTION OF COMPUTATION TIME”
By,
Naveena N
B.T.L INSTITUTE OF TECHNOLOGY
Department of Computer Science & Engineering
2013-14
Under the Guidance of:
Mrs. R Vidhyalakshmi
2. AGENDA
Objective
Literature Survey
CP-Attribute Based Encryption
CloudBees Platform
Results
Conclusion
3. OBJECTIVE
Accessing the 3rd party resources via internet is called cloud computing , which consist of
cloud storage server used for long term storage service.
In this project, given the formal model of Ciphertext-policy Attribute Based Encryption
(CP-ABE) algorithm with a hierarchical structure to improve scalability and flexibility.
This effectively eliminates the need to rely on the data storage server for preventing
unauthorized data access and integrity.
The performance measurements indicate that the proposed scheme is efficient to securely
manage the data stored in the data storage servers and significantly reduces the
computation time.
4. LITERATURE SURVEY
Yu et al, [8] “Achieving Secure, Scalable and Fine-Grained Data Access Control
in Cloud Computing,” and [14] “Attribute Based Data Sharing With Attribute
Revocation,” applied key-policy ABE to secure outsourced data in the cloud. In this
scheme, a single data owner can encrypt data and share with multiple authorized users,
. The main disadvantage in the scheme is that the data owner is also a Trusted
Authority (TA) at the same time. It would be inefficient because each user would
receive many keys from multiple owners.
V. Goyal, and V. Kumar, [12] “Identity-Based Encryption With Efficient
Revocation,” Traditionally this is often done by the authority broadcasting periodic
key updates to unrevoked users frequently but does not achieve complete backward/
forward security and is less efficient.
5. EXISTING SYSTEM
o One of the main efficiency drawbacks of the most existing ABE schemes is
that decryption is expensive for resource-limited devices due to pairing
operations, and the number of pairing operations required to decrypt a
ciphertext grows with the complexity of the access policy.
Fine grained access control not possible.
6. CP-ATTRIBUTE BASED ENCRYPTION
Attribute-based encryption (ABE) is a promising cryptographic primitive for
realizing secure and flexible access control.
In a typical implementation, the size of the ciphertext is proportional to the
number of attributes associated with it and the decryption time is proportional to
the number of attributes used during decryption this increases the computation
time.
7. ADVANTAGES
This effectively eliminates the need to rely on the data storage server for
preventing unauthorized data access and provides integrity.
The scheme substantially reduced the computation time required for
resource-limited devices to recover plaintexts.
17. CONCLUSION
In this project focused on Ciphertext-policy Attribute Based Encryption (CP-ABE)
algorithm with a hierarchical structure to improve scalability and
flexibility. This effectively eliminates the need to rely on the data storage server
for preventing unauthorized data access and integrity. The performance
measurements indicate that the proposed scheme is efficient to securely manage
the data stored in the data storage servers and significantly reduces the
computation time.