Cipher Text Policy Attribute Based Encryption (Cp-Abe) Using Concealed Policy in Public Cloud
A.C. Ashmita1, C. Yamini2 

1A.C. Ashmita, Research Scholar, Department of Computer Science, Sri Ramakrishna College of Arts & Science for Women, Coimbatore, (Tamil Nadu), India.
2Dr.C. Yamini, Associate Professor, Department of Computer Science, Sri Ramakrishna College of Arts & Science for Women, Coimbatore, (Tamil Nadu), India.

Manuscript received on 07 March 2019 | Revised Manuscript received on 14 March 2019 | Manuscript published on 30 July 2019 | PP: 3018-3023 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2916078219/19©BEIESP | DOI: 10.35940/ijrteB2916.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cloud computing focus on the data storage and the management. Since the cloud is open source for the user there have to protect the privacy and the security of the data which are less maintenances. There are several approaches designed to establish a secure data. The Signature work of this scheme is to allow the user to verify the shared in the cloud using the secret key. The anonymzed access policy can be viewed by the Cloud Service Provider (CSP) and the user; hence the recipient information will not be leaked or disclosed. The novel idea of this method is to conserve the privacy of the access policy using Cipher text Policy Access Based Encryption (CP- ABE) scheme. We have proposed a novel system, “Concealed Policy using mandatory and Role based”, using time elapsed of 10 secs. Within the required time the user, should response to the cloud using their Secret key(SK) to decrypt the file, and the owners with the Public key (PK), must encrypt the file using the mandatory access and upload it to the Third Party Auditor (TPA).This will improves the security to the user in the cloud environment. The concealed policy relies on two stages, there is Mandatory policy and Role based policy using the signature verification. Which are more efficient to the user to encrypt and decrypt the file. Without verification of the signature, the legitimate user cannot access the particulars in the cloud environment. If the signature of the user is valid, there can access (decrypt) the file using the SK. whereas, invalid signature occurs the TPA (Third Party Auditor) traces the reasonable user responsible for the signature and check with the mandatory access to encrypt the file, Nether less the access den ailed.
Index Terms: Cloud Service Provider, CP-ABE, Mandatory Policy, Role based Policy, Third Party Auditor

Scope of the Article: Cloud Computing