Mamidi Swetha, Y.Jeevan Nagendra Kumar


Within the computing atmosphere, cloud servers can have many data services, for example remote data storage furthermore to outsourced delegation computation. For data storage, servers store up numerous volume of shared information, which may be utilized by way of authoritative users. Within our work we offer anti-collusion circuit cipher text based file encryption process because cipher text based file encryption process is conceptually faster to established means of access control. We try to improve the cipher text based file encryption methods by verifiable delegation in cloud system to think about data privacy, fine-grained data access control furthermore to verifiability of delegation. In hybrid representation of verifiable delegation cipher text-policy based file encryption, a circuit cipher text-policy based file encryption, a symmetric file encryption system with an secure-then-mac mechanism are functional to make certain privacy, fine-grained access control furthermore to verifiable delegation.


Cloud Computing; Verifiable Delegation; Cipher Text-Policy Based Encryption; Fine-Grained Access Control; Anti-Collusion;


M. Green, S. Hohenberger and B. Waters, ”Outsourcing the Decryption of ABE Ciphertexts,” in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011.

J. Lai, R. H. Deng, C. Guan and J. Weng, ”Attribute-Based Encryption with Verifiable Outsourced Decryption,” in Proc. IEEE Transactions on information forensics and security, vol. 8, NO. 8, pp.1343-1354, 2013.

A. Lewko and B. Waters, ”Decentralizing Attribute-Based Encryption,” in Proc. EUROCRYPT, pp.568-588, Springer-Verlag Berlin, Heidelberg, 2011.

S. Gorbunov, V. Vaikuntanathan and H. Wee, ”Attribute-Based Encryption for Circuits,” in Proc. STOC, pp.545-554, ACM New York, NY, USA, 2013.

A. Sahai and B. Waters, ”Fuzzy Identity Based Encryption,” in Proc. EUROCRYPT, pp.457-473, Springer-Verlag Berlin, Heidelberg, 2005.

V. Goyal, O. Pandey, A. Sahai and B. Waters, ”Attribute-based Encryption for Fine-grained access control of encrypted data,” in Proc. CCS, pp.89-98, ACM New York, NY, USA, 2006.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at