ugc approved journal list IJRTI Research Journal
International Journal for Research Trends and Innovation
An International Open Access Journal | UGC and ISSN Approved
Impact Factor: 4.87

Call For Paper

Issue: July 2018

Volume 3 | Issue 7

Impact Factor: 4.87

Submit Paper Online

Click Here For more Details

For Authors

Forms / Download

Editorial Board

Subscribe IJRTI

Facts & Figure

Impact Factor : 4.87

Issue per Year : 12

Volume Published : 3

Issue Published : 26

Article Submitted : 1002

Article Published : 617

Total Authors : 1712

Total Reviewer : 500

Total Pages : 188

Total Countries : 10

Visitor Counter

Indexing Partner

Published Paper Details
Paper Title: Attribute based hybrid encryption policy for encrypting the cloud data
Authors Name: Shweta , Dr Jayashree Agarkhed
Unique Id: IJRTI1707019
Published In: Volume 2 Issue 7, July-2017
Abstract: In the cloud, for keeping data confidential and achieving access control, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are more likely to delegate the original of the decryption task to the cloud servers to reduce the cost computing. As a result, attribute-based encryption with delegation emerges. Still, there are warning and questions remaining in the previous relevant works. For instance, during the delegation, the cloud servers could damage or replace the delegated ciphertext and respond a forged computing result with malicious intent. They may also cheat the authorized users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing ciphertext-policy attribute-based hybrid encryption with verifiable delegation in the cloud has been considered in this work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the defects of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under k-multilinear Decisional & Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution.
Keywords: Random key generation, Dual encryption, time seal, Malware injection attack.
Cite Article: "Attribute based hybrid encryption policy for encrypting the cloud data ", International Journal of Science & Engineering Development Research (, ISSN:2455-2631, Vol.2, Issue 7, page no.115 - 118, July-2017, Available :
Downloads: 000323
Publication Details: Published Paper ID: IJRTI1707019
Registration ID:170428
Published In: Volume 2 Issue 7, July-2017
DOI (Digital Object Identifier):
ISSN Number: 2456 - 3315
Share Article:

Click Here to Download This Article

Article Preview

Major Indexing from
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

ISSN Details

DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related


Conference Proposal

Latest News / Updates

Open Access License Policy

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Creative Commons License This material is Open Knowledge This material is Open Data This material is Open Content

Important Details

Social Media

Untitled Document