Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme

  title={Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme},
  author={Vanitha and Sumaiya Thaseen},
  journal={VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE},
Cloud storage services are quickly increasing and more prevalent. CSP-cloud storage providers offer storage as a service to all the users. It is a paid facility that allows association to outsource their confidential data to be stored on remote servers. But, identity privacy and preserving data from an untrusted cloud is a difficult concern, because of the successive change of the members. CSP has to be secured from an illegitimate person who performs data corruption over cloud servers. Thus… Expand

Figures from this paper


Deniable cloud storage: sharing files via public-key deniability
This work introduces the concept of deniable cloud storage that guarantees privacy of data even when one's communication and storage can be opened by an adversary and designs the first sender-and-receiver deniable public-key encryption scheme that is both practical and built from standard tools. Expand
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Expand
Ciphertext-Policy Attribute-Based Encryption
A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented. Expand
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
A scheme allows a storage server to update stored ciphertexts to disqualify revoked users from accessing data that was encrypted before the user's access was revoked while key update broadcasts can dynamically revoke selected users. Expand
Attribute-based encryption for fine-grained access control of encrypted data
This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption. Expand
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
  • Brent Waters
  • Mathematics, Computer Science
  • Public Key Cryptography
  • 2011
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive cryptographic assumptions in the standard model. Our solutions allow anyExpand
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
This work proposes the first sender-deniable public key encryption system with a single encryption algorithm and negligible detection probability and describes a generic interactive construction based on a public key bit encryption scheme that has certain properties, and gives two examples of encryption schemes with these properties. Expand
Fuzzy Identity-Based Encryption
Two constructions of Fuzzy IBE schemes can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity and are both error-tolerant and secure against collusion attacks. Expand
Attribute-Based Encryption with Fast Decryption
This paper presents an implementation ofAttribute-based encryption (ABE) that allows users to encrypt and decrypt messages based on user attributes at a cost that is proportional to the number of attributes associated with it. Expand
B.,Dynamic credentials and ciphertext delegation for attribute-based encryption
  • In Advances in Cryptology–CRYPTO
  • 2012