An Efficient Securing Data using Enhanced Key Policy Attribute based Encryption in Cloud


  • M. Saraswathi
  • T. Bhuvaneswari



Cloudsecurity, Integrity, availability, privacy, Encryption, Decryption.


With the tremendous growth of sensitive records on cloud, cloud security is getting more necessary than even before. The cloud data and offerings reside in hugely scalable statistics centers and can be accessed everywhere. The increase of the cloud customers been           accompanied with a growth in malicious undertaking in the cloud. More and more vulnerabilities are discovered, and nearly every day new security advisories are published .In this regard to protect data from leaking, users need to encrypt the data before outsourcing. The Cloud service provider (CSP) should ensure integrity, availability, privacy and confidentiality of user data. The objective of this paper aims to provide a solution that ensures the storage of data securely in the cloud. A Proposed an algorithm as enhanced-key policy attribute-based encryption scheme (KP-ABE) for data security in cloud storage .Data owners encrypt their secret data for the data       receivers using enhanced KP-ABE algorithm. By applying proposed algorithm overall key generation, Encryption and decryption time is minimized.




[1] Lan Zhou, Vijay Varadharajanâ€Trust EnhancedCryptographic Role-Based Access Control for SecureCloud Data Storage†IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY,VOL. 10, NO. 11, NOVEMBER 2015

[2] .J. F. Yang and Z. B. Chen, "Cloud computing Exploration and Security Issues," 2010 IEEE Worldwide Gathering on Computational Knowledge and Programming Building (CiSE), Wuhan pp. 1-3, DOI= 10-12 Dec. 2010.

[3] Takabi, H., Joshi, J.B.D.: Security and protection challenges in cloud computing condition. IEEE Diary on Security and Protection 8(6) (November 2010)

[4] Yang, J., Chen, Z.: Cloud computing exploration and security issues. In: The Procedure of IEEE Universal Gathering on Computational Knowledge and Programming Building, pp. 1– 3 (2010)

[5] Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo, "An Effective Cloud-based Revocable Character based Intermediary Re-encryption Plan for Open Mists Information Sharing", vol. 8712. Sep. 2014, pp. 257– 272.

[6] SADIKIN RIFKI, YOUNGHO Stop, SANGJAE MOON , " A Completely Secure Figure content Strategy Trait Based Encryption With A Tree-Based Access Structure".

[7] Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,†in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146–166.

[8] Li M, Yu S, Cao N, Lou W. Authorized private keyword search over encrypted data in cloud computing. In 31st international conference on distributed computing systems (ICDCS) 2011 (pp. 383-92). IEEE.

[9] Y. Yang, J. K. Liu, K. Liang, K.- K. R. Choo, and J. Zhou, "Broadened intermediary helped approach: Accomplishing revocable fine-grained encryption of cloud information," in Proc. twentieth Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146– 166.

[10] T. Jiang, X. Chen, J. Li, D. S. Wong, J. Mama, and J. Liu, "Clock: Secure and dependable cloud storage against information re-outsourcing," in Proc. tenth Int. Conf. Inf. Secur. Pract. Exper., vol. 8434. May 2014, pp. 346– 358.

[11] Li M, Yu S, Cao N, Lou W. Approved private catchphrase seek over scrambled information in cloud computing. In 31st worldwide meeting on circulated processing frameworks (ICDCS) 2011 (pp. 383-92). IEEE.

[12] Yang Y. Towards multi-client private watchword scan for cloud computing. In IEEE global meeting on cloud computing (CLOUD) 2011 (pp. 758-9). IEEE.

[13] Wang Q, Wang C, Ren K, Lou W, Li J. Empowering open auditability and information elements for capacity security in cloud computing. IEEE Exchanges on Parallel and Conveyed Frameworks. 2011; 22(5):847-59.

[14] Joseph K. Liu and Man Ho Au and Xinyi Huang,†Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services†IEEE transactions on information forensics and security, vol. 11, no. 3, march 2016.

[15] M.Saraswathi, Dr.T.Bhuvaneswari†A Trusted Solution for Secure Outsourced Data Using Modified Key Policy AttributeBasedEncryption International Journal of Pure and Applied Mathematics Volume 118 No. 5 2018, 445-453

View Full Article: