z-logo
open-access-imgOpen Access
A Secure Delegation Process using Diffie-Hellman Assumption in Cloud Computing
Author(s) -
Sarath Kumar Sathish Kumar,
A B Sri Varsha,
Sai Praneeth
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2015906871
Subject(s) - computer science , delegation , cloud computing , computer security , process (computing) , diffie–hellman key exchange , distributed computing , encryption , operating system , public key cryptography , law , political science , key exchange
for the purpose of privacy preserving. Additionally, the attribute based encryption method is used to enhance the confidentiality and access control. Delegation is a process which is performed by the users who are containing the less computing power. They delegate their decryption process to the cloud server to reduce the computation cost. This time the cloud server may change the given cipher text and sends the modified one to the data user for malicious attack. This time the access control cannot be malleable. To enhance the access control, we propose a circuit cipher text-policy attribute-based hybrid encryption with verifiable delegation method. For the authentication purpose, mac mechanism is added with the symmetric encryption technique. By this mechanism, we can certify the confidentiality of data, accuracy of the delegated computing results and enhance the access control. Our paper uses the k-multi linear Decisional Diffie-Hellman algorithm to improve the security to the encrypted data. This scheme takes only less computational and communication cost so it will be done at practically.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom