SlideShare a Scribd company logo
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN
CLOUD COMPUTING
ABSTRACT:
Cipher text-policy attribute-based encryption (CP-ABE) has been a preferred
encryption technology to solve the challenging problem of secure data sharing
in cloud computing. The shared data files generally have the characteristic of
multilevel hierarchy, particularly in the area of healthcare and the military.
However, the hierarchy structure of shared files has not been explored in CP-
ABE. In this paper, an efficient file hierarchy attribute-based encryption
scheme is proposed in cloud computing. The layered access structures are
integrated into a single access structure, and then, the hierarchical files are
encrypted with the integrated access structure. The ciphertext components
related to attributes could be shared by the files. Therefore, both ciphertext
storage and time cost of encryption are saved. Moreover, the proposed
scheme is proved to be secure under the standard assumption. Experimental
simulation shows that the proposed scheme is highly efficient in terms of
encryption and decryption. With the number of the files increasing, the
advantages of our scheme become more and more conspicuous.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
EXISTING SYSTEM:
Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005,
which was the prototype of ABE. Latterly, a variant of ABE named CP-ABE was
proposed Since Gentry and Silverberg proposed the first notion of hierarchical
encryption scheme, many hierarchical CP-ABE schemes have been proposed.
For example, Wang et al. proposed a hierarchical ABE scheme by combining
the hierarchical IBE and CP-ABE. Wan et al. proposed hierarchical ABE
scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret
key is linear with the order of the attribute set. A ciphertextpolicy hierarchical
ABE scheme with short ciphertext is also studied. In these schemes, the parent
authorization domain governs its child authorization domains and a top-level
authorization domain creates secret key of the next-level domain. The work of
key creation is distributed on multiple authorization domains and the burden
of key authority center is lightened.
PROPOSED SYSTEM:
In this project, an efficient encryption scheme based on layered model of the
access structure is proposed in cloud computing, which is named file hierarchy
CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE
with a hierarchical structure of access policy, so as to achieve simple, flexible
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
and fine-grained access control. The contributions of our scheme are three
aspects.
• Firstly, we propose the layered model of access structure to solve the
problem of multiple hierarchical files sharing. The files are encrypted with one
integrated access structure.
• Secondly, we also formally prove the security of FH-CP-ABE scheme that can
successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear
Diffie-Hellman (DBDH) assumption.
• Thirdly, we conduct and implement comprehensive experiment for FH-CP-
ABE scheme, and the simulation results show that FH-CP-ABE has low storage
cost and computation complexity in terms of encryption and decryption. It
should be noticed that the proposed scheme differs from the subsequent CP-
ABE schemes, which utilize the user layered model to distribute the work of
key creation on multiple domain authorizations and lighten the burden of key
authority center. In addition, the part of this work is presented in [25]. The
work presented in that conference paper is rough and incomplete, where
some important aspects haven’t been considered.
CONCLUSIONS
In this paper, we proposed a variant of CP-ABE to efficiently share the
hierarchical files in cloud computing. The hierarchical files are encrypted with
an integrated access structure and the ciphertext components related to
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
attributes could be shared by the files. Therefore, both cipher text storage and
time cost of encryption are saved. The proposed scheme has an advantage that
users can decrypt all authorization files by computing secret key once. Thus,
the time cost of decryption is also saved if the user needs to decrypt multiple
files. Moreover, the proposed scheme is proved to be secure under DBDH
assumption.
REFERENCES
[1] C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns
in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp.
50–57, Oct./Dec. 2013.
[2] T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and
reliable cloud storage against data re-outsourcing,” in Proc. 10th Int. Conf. Inf.
Secur. Pract. Exper., vol. 8434. May 2014, pp. 346–358.
[3] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbased
revocable identity-based proxy re-encryption scheme for public clouds data
sharing,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp.
257–272.
[4] T. H. Yuen, Y. Zhang, S. M. Yiu, and J. K. Liu, “Identity-based encryption with
post-challenge auxiliary inputs for secure cloud applications and sensor
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
networks,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014,
pp. 130–147.
[5] K. Liang et al., “A DFA-based functional proxy re-encryption scheme for
secure public cloud data sharing,” IEEE Trans. Inf. Forensics Security, vol. 9, no.
10, pp. 1667–1680, Oct. 2014.
[6] T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times
attribute-based anonymous access control for cloud computing,” IEEE Trans.
Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015.
[7] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained twofactor access
control for Web-based cloud computing services,” IEEE Trans. Inf. Forensics
Security, vol. 11, no. 3, pp. 484–497, Mar. 2016.
[8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in
Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption
for fine-grained access control of encrypted data,” in Proc. 13th
ACM Conf.
Comput. Commun. Secur., Oct. 2006, pp. 89–98.
[10] W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based
encryption from R-LWE,” Chin. J. Electron., vol. 23, no. 4, pp. 778–782, Oct.
2014.
Ad

Recommended

DOCX
An efficient file hierarchy attribute based
cloudtechnologies42
 
PDF
An efficient file hierarchy attribute based encryption scheme in cloud computing
Shakas Technologies
 
PDF
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
PDF
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
PDF
Searchable Encryption Systems
Christopher Frenz
 
PDF
75227-144257-1-PB
Aneesh Kumar
 
PDF
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
Nexgen Technology
 
PPT
File transfer with multiple security mechanism
Shubham Patil
 
PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
PPTX
Access Control & Encryption In Cloud Environments
James Wernicke
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PDF
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
 
PDF
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
PDF
Data security framework for cloud computing networks
IAEME Publication
 
PDF
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
PPTX
Content centric networking
Phearin Sok
 
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
DOCX
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
PPTX
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
PDF
G018143943
IOSR Journals
 
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
PDF
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
PPTX
Information Centric Networking and Content Addressability
Shi Junxiao
 
PDF
Search on encrypted data
SELASI OCANSEY
 
PDF
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
PDF
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
PDF
Presentation
Saikrishna Badrinarayanan
 
DOCX
Attribute Based Encryption
UT, San Antonio
 
DOCX
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 

More Related Content

What's hot (19)

PDF
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
PPTX
Access Control & Encryption In Cloud Environments
James Wernicke
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PDF
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
 
PDF
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
PDF
Data security framework for cloud computing networks
IAEME Publication
 
PDF
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
PPTX
Content centric networking
Phearin Sok
 
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
DOCX
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
PPTX
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
PDF
G018143943
IOSR Journals
 
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
PDF
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
PPTX
Information Centric Networking and Content Addressability
Shi Junxiao
 
PDF
Search on encrypted data
SELASI OCANSEY
 
PDF
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
PDF
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 
Access Control & Encryption In Cloud Environments
James Wernicke
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
 
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
Data security framework for cloud computing networks
IAEME Publication
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
Content centric networking
Phearin Sok
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
G018143943
IOSR Journals
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Information Centric Networking and Content Addressability
Shi Junxiao
 
Search on encrypted data
SELASI OCANSEY
 
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 

Viewers also liked (14)

PDF
Presentation
Saikrishna Badrinarayanan
 
DOCX
Attribute Based Encryption
UT, San Antonio
 
DOCX
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
PDF
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
PDF
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
 
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
Ijcatr04051002
Editor IJCATR
 
PPTX
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
 
DOCX
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Maregowda R Byalachinta
 
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
PPTX
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
PPTX
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 
Attribute Based Encryption
UT, San Antonio
 
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
 
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
Ijcatr04051002
Editor IJCATR
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Maregowda R Byalachinta
 
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 
Ad

Similar to AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING,bulk ieee projects (20)

PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
PDF
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
PDF
Hierarchical attribute based solution for flexible access control in cloud co...
IJARIIT
 
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
PPTX
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
PDF
Modern Techniques for Providing Security in Cloud Computing Environment
ijsrd.com
 
PDF
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal
 
PPT
ITDCC01.ppt
Maruthi Jâcs
 
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
PDF
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
JPINFOTECH JAYAPRAKASH
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET Journal
 
PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
Hierarchical attribute based solution for flexible access control in cloud co...
IJARIIT
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Modern Techniques for Providing Security in Cloud Computing Environment
ijsrd.com
 
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal
 
ITDCC01.ppt
Maruthi Jâcs
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
JPINFOTECH JAYAPRAKASH
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET Journal
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
Ad

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology
 
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology
 
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology
 
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Nexgen Technology
 
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology
 
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology
 
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology
 
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology
 
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Nexgen Technology
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology
 

Recently uploaded (20)

PDF
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
PPTX
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
PPTX
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
PPTX
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
PDF
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
PPTX
Peer Teaching Observations During School Internship
AjayaMohanty7
 
PDF
VCE Literature Section A Exam Response Guide
jpinnuck
 
PDF
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
PDF
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
PDF
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
PPTX
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
PPTX
How to use search fetch method in Odoo 18
Celine George
 
PPTX
How to use _name_search() method in Odoo 18
Celine George
 
PDF
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
PDF
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
PPTX
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PPTX
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
PPTX
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
Peer Teaching Observations During School Internship
AjayaMohanty7
 
VCE Literature Section A Exam Response Guide
jpinnuck
 
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
How to use search fetch method in Odoo 18
Celine George
 
How to use _name_search() method in Odoo 18
Celine George
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
Gladiolous Cultivation practices by AKL.pdf
kushallamichhame
 
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 

AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING,bulk ieee projects

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING ABSTRACT: Cipher text-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP- ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous.
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com EXISTING SYSTEM: Sahai and Waters proposed fuzzy Identity-Based Encryption (IBE) in 2005, which was the prototype of ABE. Latterly, a variant of ABE named CP-ABE was proposed Since Gentry and Silverberg proposed the first notion of hierarchical encryption scheme, many hierarchical CP-ABE schemes have been proposed. For example, Wang et al. proposed a hierarchical ABE scheme by combining the hierarchical IBE and CP-ABE. Wan et al. proposed hierarchical ABE scheme. Later, Zou gave a hierarchical ABE scheme, while the length of secret key is linear with the order of the attribute set. A ciphertextpolicy hierarchical ABE scheme with short ciphertext is also studied. In these schemes, the parent authorization domain governs its child authorization domains and a top-level authorization domain creates secret key of the next-level domain. The work of key creation is distributed on multiple authorization domains and the burden of key authority center is lightened. PROPOSED SYSTEM: In this project, an efficient encryption scheme based on layered model of the access structure is proposed in cloud computing, which is named file hierarchy CP-ABE scheme (or FH-CP-ABE, for short). FH-CP-ABE extends typical CP-ABE with a hierarchical structure of access policy, so as to achieve simple, flexible
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com and fine-grained access control. The contributions of our scheme are three aspects. • Firstly, we propose the layered model of access structure to solve the problem of multiple hierarchical files sharing. The files are encrypted with one integrated access structure. • Secondly, we also formally prove the security of FH-CP-ABE scheme that can successfully resist chosen plaintext attacks (CPA) under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. • Thirdly, we conduct and implement comprehensive experiment for FH-CP- ABE scheme, and the simulation results show that FH-CP-ABE has low storage cost and computation complexity in terms of encryption and decryption. It should be noticed that the proposed scheme differs from the subsequent CP- ABE schemes, which utilize the user layered model to distribute the work of key creation on multiple domain authorizations and lighten the burden of key authority center. In addition, the part of this work is presented in [25]. The work presented in that conference paper is rough and incomplete, where some important aspects haven’t been considered. CONCLUSIONS In this paper, we proposed a variant of CP-ABE to efficiently share the hierarchical files in cloud computing. The hierarchical files are encrypted with an integrated access structure and the ciphertext components related to
  • 4. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com attributes could be shared by the files. Therefore, both cipher text storage and time cost of encryption are saved. The proposed scheme has an advantage that users can decrypt all authorization files by computing secret key once. Thus, the time cost of decryption is also saved if the user needs to decrypt multiple files. Moreover, the proposed scheme is proved to be secure under DBDH assumption. REFERENCES [1] C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013. [2] T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and reliable cloud storage against data re-outsourcing,” in Proc. 10th Int. Conf. Inf. Secur. Pract. Exper., vol. 8434. May 2014, pp. 346–358. [3] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbased revocable identity-based proxy re-encryption scheme for public clouds data sharing,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 257–272. [4] T. H. Yuen, Y. Zhang, S. M. Yiu, and J. K. Liu, “Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor
  • 5. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com networks,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 130–147. [5] K. Liang et al., “A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1667–1680, Oct. 2014. [6] T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times attribute-based anonymous access control for cloud computing,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015. [7] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained twofactor access control for Web-based cloud computing services,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484–497, Mar. 2016. [8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 89–98. [10] W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,” Chin. J. Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014.