2 research outputs found

    Cloud Storage That Makes Use Of A Feature-Based Encoding Hierarchy To Maximize Efficiency

    Get PDF
    Sharing data securely in the cloud is a major difficulty, but cipher text-policy attribute-based encryption has emerged as a top tool for meeting this need. The shared data files used in many different professions, including medicine and the military, have a multi-tiered, intricate structure. The file-sharing structure, however, has not been studied in cipher text-policy attribute-based encryption. Here, we provide a novel cloud-based encryption approach that takes advantage of hierarchies of file attributes. Before encrypting a folder tree, it is common practice to merge the various access controls into a single control scheme. Some components of the encryption text that pertain to attributes might be reused between files. The time and money needed to store encrypted documents and conduct encryption are therefore minimized. Finally, it is demonstrated that the proposed method is safe under the null hypothesis. In experimental simulations of encryption and decryption, the proposed method has been proven to be exceedingly efficient. Our method's advantages become more evident as more data is included

    An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing

    No full text
    Attribute-Based Encryption (ABE) is one of the new visions for finegrained access control in cloud computing. Plenty of research work has been done in both academic and industrial communities. However, before ABE can be deployed in data outsourcing systems, efficient enforcement of authorization policies and policy updates are the main obstacles. Therefore, in order to solve this problem, efficient and secure attribute and user revocation should be proposed in original ABE scheme, which is still a challenge in existing work. In this paper, we propose a new ciphertext-policy ABE (CP-ABE) construction with efficient attribute and user revocation, which largely eliminates the overhead computation at data service manager and data owner. Besides, we present an efficient access control mechanism based on the CP-ABE construction with one outsourcing computation service provider
    corecore