Verifiable delegation for secure outsourcing in cloud computing

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In distributed environment, to accomplish access privileges and maintain information as secret, the data proprietors could receive attribute-based encryption to encode the put-away information. Users with constrained-figuring power are, however, more prone to appoint the veil of the decryption task to the cloud servers to decrease the computing cost. During the consignment of the cloud servers, they can take the related encrypted text and may give it to the third-party people for any malicious activity; in addition to this, we have another problem of key generation of the simple attribute-based encryption (ABE). The existing ABE data outsourcing techniques are not capable of restricting the third-party people for accessing the encrypted text and outsourced decrypted text. These third-party issues should be addressed. We propose a new scheme with secure outsourced key generations and decryption by using “key-generation service center (KGSC)” and “decryption service center (DSC)” for secure data outsourcing system. We solve the problem in the existing system and also propose verifiable delegation for secure outsourcing. The unauthorized users are restricted to access the data onto achieving the data confidentiality. Our scheme also provides the fine-grain access control and allows the secure data outsourcing.

Cite

CITATION STYLE

APA

Mallela, N. S., & Devarakonda, N. (2019). Verifiable delegation for secure outsourcing in cloud computing. In Advances in Intelligent Systems and Computing (Vol. 828, pp. 685–692). Springer Verlag. https://doi.org/10.1007/978-981-13-1610-4_69

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free