scholarly journals Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing

Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2685
Author(s):  
Yanfeng Shi ◽  
Shuo Qiu

In a multimedia cloud computing system, suppose all cloud users outsource their own data sets to the cloud in the encrypted form. Each outsourced set is associated with an access structure such that a valid data user, Bob, with the credentials satisfying the access structure is able to conduct computing over outsourced encrypted set (e.g., decryption or other kinds of computing function). Suppose Bob needs to compute the set intersection over a data owner Alice’s and his own outsourced encrypted sets. Bob’s simple solution is to download Alice’s and Bob’s outsourced encrypted sets, perform set intersection operation, and decrypt the set intersection ciphertexts. A better solution is for Bob to delegate the cloud to calculate the set intersection, without giving the cloud any ability in breaching the secrecy of the sets. To solve this problem, this work introduces a novel primitive called ciphertext-policy attribute-based encryption with outsourced set intersection for multimedia cloud computing. It is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertext-policy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously. We construct a scheme that provably satisfies the desirable security properties, and analyze its efficiency.

The new and efficient method determinedly concentrates on the data processing, store and access the information which will be intended to make sure the users for legal powers should get equivalent information and also will confine the normal and unofficial legal users get admittance of the information which make suitable for those mobile cloud computing. There are various parameters with assess those execution of the active Attribute-Based encryption (ABE) method over cloud computing as takes after: cipher text measure (communication cost), private key span (storage cost), public key size (“Required storage on store public key in about powers in the ABE method”), re-keying extent (the size of the rekeying message that could make used to identify the user revocation for every attributes in the ABE system), calculation expense on the information manager (required time to encrypt the information by owner), calculation cost on the user (required run time to decrypt the information by a user). Our research work effort likewise analyses the vitality of the information security in the cloud. Purpose behind picking symmetric encryption algorithms are proficient to handle encryption and decryption to substantial measure about information and powerful speed about storing information and gaining access to those information in the cloud system.


2010 ◽  
Vol 20 (5) ◽  
pp. 1337-1348 ◽  
Author(s):  
Kang CHEN ◽  
Wei-Min ZHENG

Sign in / Sign up

Export Citation Format

Share Document