A hybrid two layer attribute based encryption for privacy preserving in public cloud

Author(s):  
Shiva Verma ◽  
Sachin Ahuja
2018 ◽  
Vol 8 (2) ◽  
pp. 27-46
Author(s):  
Basit Qureshi

This article describes how a major risk factor in the deployment of patient health records systems in the cloud is the security and privacy of data. Hybrid cloud solutions have been proposed that leverage the public and private cloud deployment to manage and alleviate accessibility, access control and privacy concerns. This article presents a privacy preserving and secure architecture for data acquisition, storage, processing and sharing. The proposed architecture is composed of a public cloud-based services that interact with a low-cost cloud computing cluster (LoC4) as a backend. A lightweight data security eco-system based on attribute based encryption is developed to provide security for public cloud-based data storage. Performance of the deployment is evaluated in a real-time deployment environment. The results show that the proposed ABE-based system is 2.3 times faster than AES-based for a variety of sizes of data blocks. It is further noted that the low-cost and affordability of LoC4 platform offers excellent opportunities for academic research in cloud based health informatics.


Cloud acts as a database for huge amount of data. It allows users to store the information or data related items in the cloud storage and allows them to use/ their data via network connection. There are different types of cloud, Public private hybrid and community. In case of public cloud the user rents the storage and stores the data in it. There exist some trust issues in storing data in the cloud since there are many untrusted users who also rented the cloud and there is need for the encryption of data there are many ways to encrypt the data the new trend in encryption is attribute based encryption. The main advantage in attribute based encryption is that it depends on the attributes of the user which differs vastly from one user to another. This paper explains about the use of attribute based encryption in cloud and how it differs from the other encryption algorithms and it advantages over other algorithms. This paper also explains about the cipher-text policy in ABE in various aspects


Cryptography ◽  
2020 ◽  
Vol 4 (4) ◽  
pp. 28
Author(s):  
Yunhong Zhou ◽  
Shihui Zheng ◽  
Licheng Wang

In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud computing. PEKS can protect user data privacy without affecting the usage of the data stored in the untrusted cloud server environment. However, most of the existing PEKS schemes concentrate on data users’ rich search functionalities, regardless of their search permission. Attribute-based encryption technology is a good method to solve the security issues, which provides fine-grained access control to the encrypted data. In this paper, we propose a privacy-preserving and efficient public key encryption with keyword search scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique to support both fine-grained access control and keyword search over encrypted data simultaneously. We formalize the security definition, and prove that our scheme achieves selective indistinguishability security against an adaptive chosen keyword attack. Finally, we present the performance analysis in terms of theoretical analysis and experimental analysis, and demonstrate the efficiency of our scheme.


2019 ◽  
Vol 74 (7-8) ◽  
pp. 401-411 ◽  
Author(s):  
Axin Wu ◽  
Yinghui Zhang ◽  
Xiaokun Zheng ◽  
Rui Guo ◽  
Qinglan Zhao ◽  
...  

Author(s):  
Neelu khare ◽  
Kumaran U.

The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.


Sign in / Sign up

Export Citation Format

Share Document