#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN
CLOUD COMPUTING
ABSTRACT:
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The
shared data files generally have the characteristic of multilevel hierarchy, particularly in the area
of healthcare and the military. However, the hierarchy structure of shared files has not been
explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme
is proposed in cloud computing. The layered access structures are integrated into a single access
structure, and then, the hierarchical files are encrypted with the integrated access structure. The
ciphertext components related to attributes could be shared by the files. Therefore, both
ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is
proved to be secure under the standard assumption. Experimental simulation shows that the
proposed scheme is highly efficient in terms of encryption and decryption. With the number of
the files increasing, the advantages of our scheme become more and more conspicuous.
EXISTING SYSTEM:
 Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was
the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.
 Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme,
many hierarchical CP-ABE schemes have been proposed. For example, Wang et al.
proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE.
 Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE
scheme, while the length of secret key is linear with the order of the attribute set. A
ciphertext policy hierarchical ABE scheme with short ciphertext is also studied.
 In these schemes, the parent authorization domain governs its child authorization
domains and a top-level authorization domain creates secret key of the next-level domain.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
The work of key creation is distributed on multiple authorization domains and the burden
of key authority center is lightened.
DISADVANTAGES OF EXISTING SYSTEM:
 In Existing System time and cost for encryption is high.
 No any special multiple hierarchical files are used.
 Decryption system time and computation cost are very high.
PROPOSED SYSTEM:
 In this study, an efficient encryption scheme based on layered model of the access
structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme
(or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical
structure of access policy, so as to achieve simple, flexible and fine-grained access
control.
 The contributions of our scheme are three aspects.
 Firstly, we propose the layered model of access structure to solve the problem of multiple
hierarchical files sharing. The files are encrypted with one integrated access structure.
 Secondly, we also formally prove the security of FH-CP-ABE scheme that can
successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie-
Hellman (DBDH) assumption.
 Thirdly, we conduct and implement comprehensive experiment for FH-CP-ABE scheme,
and the simulation results show that FH-CP-ABE has low storage cost and computation
complexity in terms of encryption and decryption.
ADVANTAGES OF PROPOSED SYSTEM:
 CP-ABE feasible schemes which has much more flexibility and is more suitable for
general applications
 Multiple hierarchical files sharing are resolved using layered model of access structure.
 In proposed system both ciphertext storage and time cost of encryption are saved.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 The proposed scheme has an advantage that users can decrypt all authorization files by
computing secret key once. Thus, the time cost of decryption is also saved if the user
needs to decrypt multiple files.
 The computation cost of decryption can also be reduced if users need to decrypt multiple
files at the same time.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

More Related Content

DOCX
An efficient file hierarchy attribute based
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
PDF
Searchable Encryption Systems
PDF
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
PDF
75227-144257-1-PB
PPTX
Isse 2014 homomorphic encryption and porticor post event
PDF
Enabling efficient multi keyword ranked
PDF
Classification of secure encrypted relationaldata in cloud computing
An efficient file hierarchy attribute based
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Searchable Encryption Systems
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
75227-144257-1-PB
Isse 2014 homomorphic encryption and porticor post event
Enabling efficient multi keyword ranked
Classification of secure encrypted relationaldata in cloud computing

What's hot (20)

DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
PPT
File transfer with multiple security mechanism
PDF
International Journal of Engineering and Science Invention (IJESI)
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
PPTX
Secry poster
PDF
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
PDF
G018143943
PPTX
Secure cloud storage
PDF
Image Steganography Based On Hill Cipher with Key Hiding Technique
PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
PPTX
Named Data Networking
PDF
Implementation of-hybrid-cryptography-algorithm
PPTX
Access Control & Encryption In Cloud Environments
PPTX
Thesis presentation 14023164
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
PDF
IJARCCE 20
PPTX
Image encryption and decryption
PPTX
Performance evluvation of chaotic encryption technique
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PDF
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
Towards secure multi keyword top-k retrieval over encrypted cloud data
File transfer with multiple security mechanism
International Journal of Engineering and Science Invention (IJESI)
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Secry poster
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
G018143943
Secure cloud storage
Image Steganography Based On Hill Cipher with Key Hiding Technique
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
Named Data Networking
Implementation of-hybrid-cryptography-algorithm
Access Control & Encryption In Cloud Environments
Thesis presentation 14023164
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IJARCCE 20
Image encryption and decryption
Performance evluvation of chaotic encryption technique
“Multimedia Steganography with Cipher Text and Compression ppt.
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
Ad

Similar to An efficient file hierarchy attribute based encryption scheme in cloud computing (20)

PDF
Dual server public-key encryption with keyword search for secure cloud storage
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Secure distributed de duplication systems with
PDF
A hybrid cloud approach for secure authorized deduplication
DOCX
A hybrid cloud approach for secure authorized deduplication
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Optimized search and-compute circuits and their application to query evaluati...
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
PDF
B04010610
Dual server public-key encryption with keyword search for secure cloud storage
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Secure distributed de duplication systems with
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
International Journal of Computational Engineering Research(IJCER)
Optimized search and-compute circuits and their application to query evaluati...
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
A Hybrid Cloud Approach for Secure Authorized Deduplication
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
B04010610
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
International_Financial_Reporting_Standa.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
20th Century Theater, Methods, History.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
TNA_Presentation-1-Final(SAVE)) (1).pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
History, Philosophy and sociology of education (1).pptx
International_Financial_Reporting_Standa.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Computer Architecture Input Output Memory.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
20th Century Theater, Methods, History.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
FORM 1 BIOLOGY MIND MAPS and their schemes

An efficient file hierarchy attribute based encryption scheme in cloud computing

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected] AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING ABSTRACT: Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous. EXISTING SYSTEM:  Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.  Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme, many hierarchical CP-ABE schemes have been proposed. For example, Wang et al. proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE.  Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret key is linear with the order of the attribute set. A ciphertext policy hierarchical ABE scheme with short ciphertext is also studied.  In these schemes, the parent authorization domain governs its child authorization domains and a top-level authorization domain creates secret key of the next-level domain.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected] The work of key creation is distributed on multiple authorization domains and the burden of key authority center is lightened. DISADVANTAGES OF EXISTING SYSTEM:  In Existing System time and cost for encryption is high.  No any special multiple hierarchical files are used.  Decryption system time and computation cost are very high. PROPOSED SYSTEM:  In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control.  The contributions of our scheme are three aspects.  Firstly, we propose the layered model of access structure to solve the problem of multiple hierarchical files sharing. The files are encrypted with one integrated access structure.  Secondly, we also formally prove the security of FH-CP-ABE scheme that can successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie- Hellman (DBDH) assumption.  Thirdly, we conduct and implement comprehensive experiment for FH-CP-ABE scheme, and the simulation results show that FH-CP-ABE has low storage cost and computation complexity in terms of encryption and decryption. ADVANTAGES OF PROPOSED SYSTEM:  CP-ABE feasible schemes which has much more flexibility and is more suitable for general applications  Multiple hierarchical files sharing are resolved using layered model of access structure.  In proposed system both ciphertext storage and time cost of encryption are saved.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected]  The proposed scheme has an advantage that users can decrypt all authorization files by computing secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt multiple files.  The computation cost of decryption can also be reduced if users need to decrypt multiple files at the same time. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.2.1  Database : MYSQL