SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN
CLOUD COMPUTING
ABSTRACT:
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The
shared data files generally have the characteristic of multilevel hierarchy, particularly in the area
of healthcare and the military. However, the hierarchy structure of shared files has not been
explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme
is proposed in cloud computing. The layered access structures are integrated into a single access
structure, and then, the hierarchical files are encrypted with the integrated access structure. The
ciphertext components related to attributes could be shared by the files. Therefore, both
ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is
proved to be secure under the standard assumption. Experimental simulation shows that the
proposed scheme is highly efficient in terms of encryption and decryption. With the number of
the files increasing, the advantages of our scheme become more and more conspicuous.
EXISTING SYSTEM:
 Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was
the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.
 Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme,
many hierarchical CP-ABE schemes have been proposed. For example, Wang et al.
proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE.
 Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE
scheme, while the length of secret key is linear with the order of the attribute set. A
ciphertext policy hierarchical ABE scheme with short ciphertext is also studied.
 In these schemes, the parent authorization domain governs its child authorization
domains and a top-level authorization domain creates secret key of the next-level domain.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
The work of key creation is distributed on multiple authorization domains and the burden
of key authority center is lightened.
DISADVANTAGES OF EXISTING SYSTEM:
 In Existing System time and cost for encryption is high.
 No any special multiple hierarchical files are used.
 Decryption system time and computation cost are very high.
PROPOSED SYSTEM:
 In this study, an efficient encryption scheme based on layered model of the access
structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme
(or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical
structure of access policy, so as to achieve simple, flexible and fine-grained access
control.
 The contributions of our scheme are three aspects.
 Firstly, we propose the layered model of access structure to solve the problem of multiple
hierarchical files sharing. The files are encrypted with one integrated access structure.
 Secondly, we also formally prove the security of FH-CP-ABE scheme that can
successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie-
Hellman (DBDH) assumption.
 Thirdly, we conduct and implement comprehensive experiment for FH-CP-ABE scheme,
and the simulation results show that FH-CP-ABE has low storage cost and computation
complexity in terms of encryption and decryption.
ADVANTAGES OF PROPOSED SYSTEM:
 CP-ABE feasible schemes which has much more flexibility and is more suitable for
general applications
 Multiple hierarchical files sharing are resolved using layered model of access structure.
 In proposed system both ciphertext storage and time cost of encryption are saved.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 The proposed scheme has an advantage that users can decrypt all authorization files by
computing secret key once. Thus, the time cost of decryption is also saved if the user
needs to decrypt multiple files.
 The computation cost of decryption can also be reduced if users need to decrypt multiple
files at the same time.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL
Ad

Recommended

DOCX
An efficient file hierarchy attribute based
cloudtechnologies42
 
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
PDF
Searchable Encryption Systems
Christopher Frenz
 
PDF
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
PDF
75227-144257-1-PB
Aneesh Kumar
 
PPTX
Isse 2014 homomorphic encryption and porticor post event
ICT Economic Impact
 
PDF
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
PDF
Classification of secure encrypted relationaldata in cloud computing
eSAT Journals
 
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
PPT
File transfer with multiple security mechanism
Shubham Patil
 
PDF
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
PPTX
Secry poster
ALIN BABU
 
PDF
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET Journal
 
PDF
G018143943
IOSR Journals
 
PPTX
Secure cloud storage
ALIN BABU
 
PDF
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
PPTX
Named Data Networking
Mustafa Cantürk
 
PDF
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
PPTX
Access Control & Encryption In Cloud Environments
James Wernicke
 
PPTX
Thesis presentation 14023164
Thivya Devaraj
 
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
PDF
IJARCCE 20
Nahan Rahman
 
PPTX
Image encryption and decryption
Aashish R
 
PPTX
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
PDF
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
 
PDF
Dual server public-key encryption with keyword search for secure cloud storage
Shakas Technologies
 
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 

More Related Content

What's hot (20)

DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
PPT
File transfer with multiple security mechanism
Shubham Patil
 
PDF
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
PPTX
Secry poster
ALIN BABU
 
PDF
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET Journal
 
PDF
G018143943
IOSR Journals
 
PPTX
Secure cloud storage
ALIN BABU
 
PDF
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
PPTX
Named Data Networking
Mustafa Cantürk
 
PDF
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
PPTX
Access Control & Encryption In Cloud Environments
James Wernicke
 
PPTX
Thesis presentation 14023164
Thivya Devaraj
 
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
PDF
IJARCCE 20
Nahan Rahman
 
PPTX
Image encryption and decryption
Aashish R
 
PPTX
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
PDF
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
JPINFOTECH JAYAPRAKASH
 
File transfer with multiple security mechanism
Shubham Patil
 
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Secry poster
ALIN BABU
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET Journal
 
G018143943
IOSR Journals
 
Secure cloud storage
ALIN BABU
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
Named Data Networking
Mustafa Cantürk
 
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Access Control & Encryption In Cloud Environments
James Wernicke
 
Thesis presentation 14023164
Thivya Devaraj
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
IJARCCE 20
Nahan Rahman
 
Image encryption and decryption
Aashish R
 
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
 

Similar to An efficient file hierarchy attribute based encryption scheme in cloud computing (20)

PDF
Dual server public-key encryption with keyword search for secure cloud storage
Shakas Technologies
 
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
DOCX
Secure distributed de duplication systems with
Shakas Technologies
 
PDF
A hybrid cloud approach for secure authorized deduplication
Shakas Technologies
 
DOCX
A hybrid cloud approach for secure authorized deduplication
Vasanth Mca
 
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Optimized search and-compute circuits and their application to query evaluati...
Shakas Technologies
 
PDF
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
PDF
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
PDF
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
Nexgen Technology
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
B04010610
IJMER
 
Dual server public-key encryption with keyword search for secure cloud storage
Shakas Technologies
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
Secure distributed de duplication systems with
Shakas Technologies
 
A hybrid cloud approach for secure authorized deduplication
Shakas Technologies
 
A hybrid cloud approach for secure authorized deduplication
Vasanth Mca
 
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Shakas Technologies
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Optimized search and-compute circuits and their application to query evaluati...
Shakas Technologies
 
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
Nexgen Technology
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
B04010610
IJMER
 
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
DOCX
A Novel Framework for Credit Card.
Shakas Technologies
 
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
DOCX
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 
Ad

Recently uploaded (20)

PDF
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
PDF
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PPTX
Peer Teaching Observations During School Internship
AjayaMohanty7
 
PPTX
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
PDF
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
PPTX
How payment terms are configured in Odoo 18
Celine George
 
PPTX
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
PPTX
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
PPTX
Wage and Salary Computation.ppt.......,x
JosalitoPalacio
 
PPTX
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
PPTX
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
PPTX
Photo chemistry Power Point Presentation
mprpgcwa2024
 
PPTX
How to Customize Quotation Layouts in Odoo 18
Celine George
 
PPTX
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
PPTX
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
PPTX
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
PDF
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
PPTX
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
PPTX
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
Peer Teaching Observations During School Internship
AjayaMohanty7
 
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
How payment terms are configured in Odoo 18
Celine George
 
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
 
Wage and Salary Computation.ppt.......,x
JosalitoPalacio
 
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
Photo chemistry Power Point Presentation
mprpgcwa2024
 
How to Customize Quotation Layouts in Odoo 18
Celine George
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 

An efficient file hierarchy attribute based encryption scheme in cloud computing

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected] AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING ABSTRACT: Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous. EXISTING SYSTEM:  Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed.  Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme, many hierarchical CP-ABE schemes have been proposed. For example, Wang et al. proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE.  Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret key is linear with the order of the attribute set. A ciphertext policy hierarchical ABE scheme with short ciphertext is also studied.  In these schemes, the parent authorization domain governs its child authorization domains and a top-level authorization domain creates secret key of the next-level domain.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected] The work of key creation is distributed on multiple authorization domains and the burden of key authority center is lightened. DISADVANTAGES OF EXISTING SYSTEM:  In Existing System time and cost for encryption is high.  No any special multiple hierarchical files are used.  Decryption system time and computation cost are very high. PROPOSED SYSTEM:  In this study, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control.  The contributions of our scheme are three aspects.  Firstly, we propose the layered model of access structure to solve the problem of multiple hierarchical files sharing. The files are encrypted with one integrated access structure.  Secondly, we also formally prove the security of FH-CP-ABE scheme that can successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie- Hellman (DBDH) assumption.  Thirdly, we conduct and implement comprehensive experiment for FH-CP-ABE scheme, and the simulation results show that FH-CP-ABE has low storage cost and computation complexity in terms of encryption and decryption. ADVANTAGES OF PROPOSED SYSTEM:  CP-ABE feasible schemes which has much more flexibility and is more suitable for general applications  Multiple hierarchical files sharing are resolved using layered model of access structure.  In proposed system both ciphertext storage and time cost of encryption are saved.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: [email protected], [email protected]  The proposed scheme has an advantage that users can decrypt all authorization files by computing secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt multiple files.  The computation cost of decryption can also be reduced if users need to decrypt multiple files at the same time. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.2.1  Database : MYSQL