CFP last date
20 January 2025
Reseach Article

A Secure Delegation Process using Diffie-Hellman Assumption in Cloud Computing

by Sarath Kumar Reddy G., Anish Varsha I., Sai Praneeth R.V.C
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 2
Year of Publication: 2015
Authors: Sarath Kumar Reddy G., Anish Varsha I., Sai Praneeth R.V.C
10.5120/ijca2015906871

Sarath Kumar Reddy G., Anish Varsha I., Sai Praneeth R.V.C . A Secure Delegation Process using Diffie-Hellman Assumption in Cloud Computing. International Journal of Computer Applications. 130, 2 ( November 2015), 1-6. DOI=10.5120/ijca2015906871

@article{ 10.5120/ijca2015906871,
author = { Sarath Kumar Reddy G., Anish Varsha I., Sai Praneeth R.V.C },
title = { A Secure Delegation Process using Diffie-Hellman Assumption in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 2 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number2/23178-2015906871/ },
doi = { 10.5120/ijca2015906871 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:54.991132+05:30
%A Sarath Kumar Reddy G.
%A Anish Varsha I.
%A Sai Praneeth R.V.C
%T A Secure Delegation Process using Diffie-Hellman Assumption in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 2
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data owner encrypt their data before outsourcing into the cloud for the purpose of privacy preserving. Additionally, the attribute based encryption method is used to enhance the confidentiality and access control. Delegation is a process which is performed by the users who are containing the less computing power. They delegate their decryption process to the cloud server to reduce the computation cost. This time the cloud server may change the given cipher text and sends the modified one to the data user for malicious attack. This time the access control cannot be malleable. To enhance the access control, we propose a circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation method. For the authentication purpose, mac mechanism is added with the symmetric encryption technique. By this mechanism, we can certify the confidentiality of data, accuracy of the delegated computing results and enhance the access control. Our paper uses the k-multi linear Decisional Diffie-Hellman algorithm to improve the security to the encrypted data. This scheme takes only less computational and communication cost so it will be done at practically.

References
  1. B. Waters,” Ciphertext-Policy Attribute-Based Encryption: An Expressive, Enficient, and Provably Secure Realization,” in Proc. PKC, pp.53-70, Springer-Verlag Berlin, Heidelberg, 2011.
  2. Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In TCC, pages 422–439, 2012.
  3. S. Yamada, N. Attrapadung and B. Santoso,” Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication,” in Proc. PKC, pp.243-261, Springer-Verlag Berlin, Heidelberg, 2012.
  4. T. Granlund and the GMP development team, ”GNU MP: The GNU Multiple Precision Arithmetic Library, 5.1.1,” 2013, http://gmplib.org/.
  5. J. Coron, T. Lepoint and M. Tibouchi,” Practical Multilinear Maps over the Integer,” in Proc. CRYPTO, pp.476-493, Springer-Verlag Berlin, Heidelberg, 2013.
  6. V. Goyal, O. Pandey, A. Sahai and B. Waters,” Attribute-based Encryption for Fine-grained access control of encrypted data,” in Proc. CCS, pp.89-98, ACM New York, NY, USA, 2006.
  7. M. Abe, R. Genaro and K. Kurosawa,” Tag-KEM/DEM: A New Framework for Hybrid Encryption,” in Proc. CRYPTO, pp.97-130, Springer-Verlag New York, NJ, USA, 2008.
  8. S. Garg, C. Gentry and Shai Halevi,” Candidate Mulitilinear Maps from Ideal Lattices and Applications,” in Proc. EUROCRYPT, pp.1-17, Springer-Verlag Berlin, Heidelberg, 2013.
  9. Melissa Chase and Sherman S. M. Chow. Improving privacy and security in multiauthority attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 121–130, 2009.
  10. Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, pages 146–162, 2008.
  11. M. Green, S. Hohenberger and B. Waters,” Outsourcing the Decryption of ABE Cipher texts,” in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011.
  12. Tatsuaki Okamoto and Katsuyuki Takashima. Adaptively attribute-hiding (hierarchical) inner product encryption. In EUROCRYPT, pages 591–608, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Attribute based encryption data sharing verifiable delegation authentication confidentiality.