Enhanced Attribute Based Encryption for Cloud Computing

被引:19
作者
Kumar, Saravana N. [1 ]
Lakshmi, Rajya G., V [2 ]
Balamurugan, B. [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[2] Univ Massachusetts, Coll Sci & Math, Boston, MA 02125 USA
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014 | 2015年 / 46卷
关键词
Cloud computing; security; privacy; Attribute based Encryption;
D O I
10.1016/j.procs.2015.02.127
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is emerging paradigm provides various IT related services. The security and privacy are two major factors that inhibits the growth of cloud computing. Security factors are reasons behind lesser number of real times and business related cloud applications compared to consumer related cloud application. Firstly, the pros and cons of different Attribute Based encryption methods are analysed. Secondly, a new encryption method based on Attribute Based Encryption (ABE) using hash functions, digital signature and asymmetric encryptions scheme has been proposed. Our proposed algorithm is simplified yet efficient algorithm that can implemented for cloud critical application. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:689 / 696
页数:8
相关论文
共 13 条
[1]  
Arshad Junaid, 2009, Proceedings of the 2009 IEEE 15th International Conference on Parallel and Distributed Systems (ICPADS 2009), P479, DOI 10.1109/ICPADS.2009.46
[2]   On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited [J].
Chatterjee, Sanjit ;
Menezes, Alfred .
DISCRETE APPLIED MATHEMATICS, 2011, 159 (13) :1311-1322
[3]  
Christodorescu Mihai., 2009, P 2009 ACM WORKSHOP, P97, DOI [DOI 10.1145/1655008.1655022, 10.1145/1655008.1655022]
[4]  
Duan Q., 2012, Network and Service Management, IEEE Transactions on, V9, P373
[5]  
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]  
Green M., 2011, P USENIX SEC S, P34
[8]   Attribute-Based Encryption With Verifiable Outsourced Decryption [J].
Lai, Junzuo ;
Deng, Robert H. ;
Guan, Chaowen ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) :1343-1354
[9]  
Marwaha1 Mohit, 2013, INT J COMPUTER SCI I, V10
[10]   Attribute-Based Encryption with Non-Monotonic Access Structures [J].
Ostrovsky, Rafail ;
Sahai, Amit ;
Waters, Brent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :195-+