Secured Cloud Storage via Attribute-based Encryption

Authors

  • B Sowmya Dept. of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Ranga Reddy, India
  • K Madhavi Dept. of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Ranga Reddy, India

DOI:

https://doi.org/10.26438/ijcse/v5i7.96100

Keywords:

Encryption, Attribute Based Encryption, Cloud Storage

Abstract

Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been struggle to protect data from the attackers. All of that schemes assumed that cloud storage providers are safe and it won’t be target by the attackers; however, in practice, some government (i.e., coercers) may force cloud storage providers to expose user secrets or private data on the cloud, thus altogether avoid storage encryption schemes. In this paper, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create authentic fake user secrets to protect user privacy. By utilizing our systems scrambled information can be up to confidential regardless of the possibility that the capacity server is endowed; in addition, our techniques are secure against agreement assaults. Since coercers can't reveal if got privileged insights are valid or not, the distributed storage suppliers guarantee that client protection is still safely ensured. And we are also providing secret key mechanism which is aspired by KDC (Key distribution Center) one of the module and also authentication for each user to make the more secured and confidential. Were also captured the unauthorized attackers’ information also.

References

Shreeraghav kulkarni, Sujata Terdal, "Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.47-51, 2017.

V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.

A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.

S. Mewada, P. Sharma, and S. S. Gautam, “Investigation of Efficient Cryptic Algorithm for Text using SM Crypter”, International Journal of Information Science and Computing, vol. 3, no. 2, p. 99, 2016.

A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and ciphertext delegation for attribute-based encryption”, in Crypto, 2012, pp. 199–217.

S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption”, in Public Key Cryptography, 2013, pp. 162–179.

P. K. Tysowski and M. A. Hasan, “Hybrid attribute and reencryption based key manage-ment for secure and scalable mobile app-lications in clouds”, IEEE T. Cloud Computing, pp. 172–186, 2013.

D. Bradbury, “Can we make email secure?”, Network Security, vol. 2014, no. 3, pp. 13–16, Mar. 2014.

P.-W. Chi and C.-L. Lei, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption”, IEEE Transactions on Cloud Computing, pp. 1–1, 2015.

R. F. Anda, A. Butchart, V. J. Felitti, and D. W. Brown, “Building a Framework for Global Surveillance of the Public Health Implications of Adverse Childhood Experiences”, American Journal of Preventive Medicine, vol. 39, no. 1, pp. 93–98, Jul. 2010.

Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.

P.Gasti, G.Ateniese, and M. Blanton, “Deniable cloud storage: sharing files via public-key deniability”, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pp. 31– 42, 2010.

Downloads

Published

2025-11-11
CITATION
DOI: 10.26438/ijcse/v5i7.96100
Published: 2025-11-11

How to Cite

[1]
B. Sowmya and K. Madhavi, “Secured Cloud Storage via Attribute-based Encryption”, Int. J. Comp. Sci. Eng., vol. 5, no. 7, pp. 96–100, Nov. 2025.

Issue

Section

Review Article