1 / 9

Attributes based encryption with verifiable outsourced dec

Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy.

kaashivit
Télécharger la présentation

Attributes based encryption with verifiable outsourced dec

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Verifiable Cryptographic Based Data Transformation System IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL.8, NO.8, JULY 2014. Attributes based encryption with verifiable outsourced decryption

  2. A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager

  3. Abstract • Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. • A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. • (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. • We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation

  4. Proposed System • In the proposed system the evaluation and accuracy of the attributes are traced in order to provide better encryption/decryption strategy while transferring data from source to destination. • The generation of the public and private key using the attributes and master key with proxies and access structure attributes are same as the existing system. • The combination of the public and private key generates the message. • The verification of the outsourced decryption are also made using the combination of private key and parameter attribute that generates the transform and retrieve key similarly as the existing system. • Additionally the concept of proxy verification are made since the proxies are intermediate between the source and the destination. The validation are made using the private key check with the proxies and the source.

  5. Existing System • In the existing system the concepts of attribute based encryption and verifiable outsourced decryption is formulated to transfer a data from source to destination. • There are two keys such as private and public key are evolved. And the combination of the keys generates the message that has to transfer from one end to other. • Hence the combination of private key with parameter attributes generates transform and retrieve key. • Where transform key generates partial cipher key that has to passed to the retrieve key so as to generated the original message. • The main drawback over the existing system is that there is no proper verification with the proxies. And the attributes considered to frame the message are not unique in case of common parametric data.

  6. System Requirements • Hardware Requirements: System : Pentium IV and above. Hard Disk : 40 GB or Above. Monitor : VGA and High resolution monitor Mouse : Logitech. Ram : 1 GB or Above • Software Requirements: Operating system : Windows VISTA or Above. Front End : Microsoft Visual Studio 2010 (.NetFramework 4.0) Coding Language : C# Backend : SQL Server 2008 R2

  7. Architecture Diagram

  8. Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record

  9. Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.

More Related