Call of Papers for Current Volume ********************OnLine Paper Submission for Current Volume

Volume & Issue no: Volume 3, Issue 4, July - August 2014


Hybrid Attribute Based Encryption
Author Name:
GD Makkar, Vivek Panwar
Abstract Now a day, cloud computing has become a significant technology trend. The cloud computing technology benefits include cost savings, high availability of resources, and easy scalability. The cloud computing provides many services to the users. These are Software as a Service, Platform as a Service and Infrastructure as a Service. For any enterprise, data plays a significant role in its growth. Cloud computing also provides the facility to the enterprises to store their valuable data remotely at cloud. One of the main hurdles that disallow the use of cloud computing is the security of data in the cloud as the users have no physical contact with the data. The only way to secure the data in the cloud is encrypting the data before storing it. The threat to the data stored in the cloud is not only from the intruders outside of the organization but also from the malicious users inside the cloud service provider who have inherently access to the databases. The only possible solution to protect our private and confidential data on the cloud is to encrypt it before storage. There are many schemes are proposed and used in the past ranging from Identity Based Encryption (IDE), Fuzzy Attribute Based Encryption (Fuzzy ABE), Key-Policy Attribute Based Encryption (KP-ABE) to Cipher-Policy Attribute Based Encryption (CP-ABE). One problem with KP-ABE and CP-ABE is that both use single trusted authority. Data owner is only trusted authority. It can be bottlenecked. In our approach, we used the hybrid Attribute Based Encryption (HbABE) where we combine scheme KPABE and CP-ABE and use the concept of access structure that defines which users can decrypt the data. In our scheme, we used two tree structures, one used as access structure and the other is used as a private key. HbABE is specifically designed for the company to be used internally purpose not for the public use. It provides the security at three levels, first, using symmetric data encryption, second KP-ABE & CP-ABE and third using the biometric identity. Its purpose is to fully secure the company’s file both from outside as well as inside intruders. Keywords: Cloud computing security, encryption, ABE, KP-ABE, CP-ABE.
Cite this article:
GD Makkar, Vivek Panwar , " Hybrid Attribute Based Encryption " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) , Volume 3, Issue 4, July - August 2014 , pp. 238-243 , ISSN 2278-6856.
Full Text [PDF]                           Back to Current Issue

NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week. 


Contact us

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
ISSN 2278-6856
Frequency : 6 Issues/Year