The goal of this research is to make attribute-based encryption (ABE) more suitable for data access control in the cloud.We focus on offering the encryptor complete control over access permissions, allowing for effective key management even in the face of many independent authorities. Cloud computing expansion is hampered by two primary factors: security and privacy. The fact that there are less real-time and business-related cloud applications than consumer-related cloud applications is due to security concerns. A new encryption approach based on Attribute Based Encryption (ABE) has been presented, which includes hash functions, digital signatures, and asymmetric encryption schemes. Our proposed algorithm is a simple but effective technique that can be used in cloud-based applications.
[1]. JunzuoLai,Deng, R.H, Chaowen Guan, JianWeng,.Attribute-Based Encryption With Verifiable Outsourced Decryption Information Forensics and Security, IEEE Transactions on , vol.8, no.8, pp.1343,1354, Aug. 2013.
[2]. B. Waters. Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization in Proc. Public Key Cryptography, 2011, pp. 53–70.
[3]. VipulGoyal, OmkantPandey, AmitSahai, and Brent Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (CCS '06).ACM, New York, NY, USA, 89-98.
[4]. Matthew Green, Susan Hohenberger, and Brent Waters. 2011. Outsourcing the decryption of ABE ciphertexts. In Proceedings of the 20th USENIX conference on Security (SEC'11).USENIX Association, Berkeley, CA, USA, 34-34.
[5]. Dropboxnews.https:// www.dropbox.com/news.