Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 828))

  • 1082 Accesses

Abstract

In distributed environment, to accomplish access privileges and maintain information as secret, the data proprietors could receive attribute-based encryption to encode the put-away information. Users with constrained-figuring power are, however, more prone to appoint the veil of the decryption task to the cloud servers to decrease the computing cost. During the consignment of the cloud servers, they can take the related encrypted text and may give it to the third-party people for any malicious activity; in addition to this, we have another problem of key generation of the simple attribute-based encryption (ABE). The existing ABE data outsourcing techniques are not capable of restricting the third-party people for accessing the encrypted text and outsourced decrypted text. These third-party issues should be addressed. We propose a new scheme with secure outsourced key generations and decryption by using “key-generation service center (KGSC)” and “decryption service center (DSC)” for secure data outsourcing system. We solve the problem in the existing system and also propose verifiable delegation for secure outsourcing. The unauthorized users are restricted to access the data onto achieving the data confidentiality. Our scheme also provides the fine-grain access control and allows the secure data outsourcing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

  2. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceeding of 14th international conference practice theory public key cryptography, pp 53–70

    Chapter  Google Scholar 

  3. Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Proceeding of 9th international conference theory cryptographic, pp 422–439

    Chapter  Google Scholar 

  4. Yamada S, Attrapadung N, Santoso B (2012) Verifiable predicate encryptin and applications to CCA security and anonymous predicate authentication. In: Proceeding of international conference practice theory public key cryptography conference, pp 243–261

    Chapter  Google Scholar 

  5. Han J, Susilo W, Mu Y, Yan J (2012) Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 23(11):2150–2162

    Article  Google Scholar 

  6. Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute based encryption for circuits from multilinear maps. In: Proceeding of 33rd international cryptology conference, pp 479–499

    Chapter  Google Scholar 

  7. Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Proceeding of 45th annual ACM symposium theory computing, pp 545–554

    Google Scholar 

  8. Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Proceeding of 30th annual international conference theory applications cryptographic techniques, pp 457–473

    Google Scholar 

  9. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceeding of 13th ACM conference computer communication security, pp 89–98

    Google Scholar 

  10. Cramer R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of 18th international cryptology conference, pp 13–25

    Chapter  Google Scholar 

  11. Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  12. Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214–1221

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nalini Sri Mallela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mallela, N.S., Devarakonda, N. (2019). Verifiable Delegation for Secure Outsourcing in Cloud computing. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_69

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1610-4_69

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1609-8

  • Online ISBN: 978-981-13-1610-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics