• Amritesh Kumar
Keywords: Access control, Attribute based encryption, Key policy, cipher text policy, hierarchical-ASBE.


Cloud computing is going to be very famous technology in IT enterprises. For an
enterprise, the data stored is huge and it is very precious. All tasks are performed through
networks. Hence, it becomes very important to have the secured use of data. In cloud
computing, the most important concerns of security are data security and privacy. And also
flexible and scalable, fine grained access control must be maintained in the cloud systems. For
access control, being one of the classic research topics, many schemes have been proposed
and implemented. There are policy based schemes have been proposed. In this paper, we are
going to explore various schemes for encryption that consist of Attribute based encryption
(ABE) and its types CP-ABE. Further discussion consists of improvement in CP-ABE to CPASBE
and to HASBE. A comparison table has been included for comparative study of these
techniques. In this project, we propose a framework for efficient and privacy-preserving
outsourced cloud using CP-ABE technique. Our proposed technique is designed to allow
users to outsource their own data to cloud server for secure processing. Using CP-ABE, a user
can securely outsource the storing and processing of data to a cloud server without
compromising the security of the (original) data and the computed results. More specifically,
we present a cipher policy attribute based encryption with RSA key distribution, the core
cryptographic primitive, to reduce the private key exposure risk in data processing.


Download data is not yet available.

Author Biography

Amritesh Kumar

Department of Computer Science Engineering, SRM University, Ramapuram, Chennai – 89.


[1] J. Bethencourt, A. Sahai and B. Waters, “Ciphertext-policy attribute based encryption,” IEEE Symp. Security and Privacy, Oakland, CA, 2007.

[2] Ivan Damgård, Thomas P. Jakobsen, JesperBuus Nielsen, and Jakob I. Pagter, “Secure Key Management in the Cloud”, Cryptography and Coding Lecture Notes in Computer Science, volume 8306, pp. 270-289, Springer, 2013.

[3]A. Beimel, “Secret-sharing schemes: A survey,” in Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao,China, May 30-June 3, 2011. Proceedings, 2011, pp. 11–46.

[4]Y.G.Min, Y.H.Bang, “Cloud Computing Security Issues and Access Control Solutions”, Journel of Security Engineering, vol.2, 2012.

[5] ChangjiWang1,2,3 and Jianfa Luo1,2 “An EfficientKey-Policy Attribute-Based Encryption Scheme with Constant Cipher text Length” Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2013.

[6]M. Bellare and P. Rogaway. Optimal asymmetricencryption - how to encrypt with RSA. In Proc. Eurocrypt1994.

[7]Shinde, G.N. and H.S. Fade War,.Faster RSA algorithm fordecryption using Chinese remainder theorem. ICCES,Vol.5,No.4,pp.255-261,2008.

[8] T. Kawno, S. Matsui, T. Yasue, and C. Konno, “Secure Communication Infrastructure for Mobile,” in Hitach Review, vol. 48, no. 1, pp. 15-20, 1999.

[9]Prasad Saripalli, and Ben Walters, “QUIRC: a quantitative impactandrisk assessment framework for cloud security,” IEEE 2rd InternationalConference on Cloud Computing (2010).

[10] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey,you,getoff of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009.