Abstract
In distributed environment, to accomplish access privileges and maintain information as secret, the data proprietors could receive attribute-based encryption to encode the put-away information. Users with constrained-figuring power are, however, more prone to appoint the veil of the decryption task to the cloud servers to decrease the computing cost. During the consignment of the cloud servers, they can take the related encrypted text and may give it to the third-party people for any malicious activity; in addition to this, we have another problem of key generation of the simple attribute-based encryption (ABE). The existing ABE data outsourcing techniques are not capable of restricting the third-party people for accessing the encrypted text and outsourced decrypted text. These third-party issues should be addressed. We propose a new scheme with secure outsourced key generations and decryption by using “key-generation service center (KGSC)” and “decryption service center (DSC)” for secure data outsourcing system. We solve the problem in the existing system and also propose verifiable delegation for secure outsourcing. The unauthorized users are restricted to access the data onto achieving the data confidentiality. Our scheme also provides the fine-grain access control and allows the secure data outsourcing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceeding of 14th international conference practice theory public key cryptography, pp 53–70
Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Proceeding of 9th international conference theory cryptographic, pp 422–439
Yamada S, Attrapadung N, Santoso B (2012) Verifiable predicate encryptin and applications to CCA security and anonymous predicate authentication. In: Proceeding of international conference practice theory public key cryptography conference, pp 243–261
Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162
Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute based encryption for circuits from multilinear maps. In: Proceeding of 33rd international cryptology conference, pp 479–499
Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Proceeding of 45th annual ACM symposium theory computing, pp 545–554
Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Proceeding of 30th annual international conference theory applications cryptographic techniques, pp 457–473
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceeding of 13th ACM conference computer communication security, pp 89–98
Cramer R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of 18th international cryptology conference, pp 13–25
Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mallela, N.S., Devarakonda, N. (2019). Verifiable Delegation for Secure Outsourcing in Cloud computing. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_69
Download citation
DOI: https://doi.org/10.1007/978-981-13-1610-4_69
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1609-8
Online ISBN: 978-981-13-1610-4
eBook Packages: EngineeringEngineering (R0)