Efficient Secured Two Party Computing with Encrypted Data for Public Cloud
L.Kalaivani , Dr.R.Kalpana
In this project we intervened certificateless encryption plan without matching operations for safely imparting public cloud. Intervened certificateless open key encryption (mCL-PKE –Mediated certificateless public key encryption) takes care of the key escrow issue in identity based encryption and testament repudiation issue in public cloud key cryptography. In existing mCL-PKE plans are wasteful in utilization of costly blending operations or helpless against incomplete unscrambling assaults. With a specific end goal to address the execution and security issues, in this project, we first propose a mCL-PKE plan without utilizing matching operations. We apply our mCL-PKE plan to develop a down to earth answer for the issue of offering touchy data out in the open mists. The cloud is utilized as a protected stockpiling and a key era focus. In our framework, the information manager scrambles the delicate information utilizing the cloud produced clients' open keys focused around its get to control arrangements and transfers the scrambled information to the cloud. Upon effective approval, the cloud incompletely unscrambles the encoded information for the clients. The clients in this manner completely unscramble the halfway decoded information utilizing their private keys. The secrecy of the substance and the keys is safeguarded as for the cloud, in light of the fact that the cloud can't completely unscramble the data. We additionally propose an augmentation to the above methodology to enhance the effectiveness of encryption at the information manager. Finally we execute our mCL-PKE plan and the general cloud based framework with the help of proxy, in order to access data if users lost their certificate or key.
Cloud Computing, Proxy Re- encryption, Attribute based Encryption,Cloud Security
 V.Goyal,O. Pandey,A.Sahai,andB. Waters, “Attribute- based encryptionforfine-grainedaccesscontrol of encrypted data,” in CCS,ACM, 2006,pp.89–98.
 S.Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable,andfine-graineddata access controlincloud computing,” inINFOCOM, 2010,pp.534–5.
R. Ostrovsky,A. Sahai, and B. Waters, “Attribute-based encryptionwithnon-monotonic accessstructures,”inACM Conference onComputer andCommunications Security, 2007, pp.195–203.
Y.Zhu, H.Hu, G.-J.Ahn, D.Huang, and S.Wang, “Towards Temporal Access control inclouds,” in Proc.IEEE INFOCOM, 2012,pp.2576-2580.
 Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM,IEEE, 2010, pp. 534–542.
 Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, “Comparisonbased encryption for fine-grained access control in clouds,” in CODASPY, ACM, 2012, pp. 23-55.
 A.Sahai and B. Waters, “Fuzzy identity-based encryption,” in EUROCRYPT, Springer, 2005, pp. 457–473.
 Zhiguo Wan, Jun’e Liu, Robert H. Deng,”HASBE: A Hierarchical Attribute - Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE Transactions on Information Forensincs and Security, Vol. 7, NO. 2, April 2012, pp. 67-90.
 Tim Mather, Subra Kumaraswamy, shahed Latif, “Cloud Security and privacy: An Enterprise respective of risk and compliance Theory in practice” , 2012, pp. 98- 105.
[L.Kalaivani , Dr.R.Kalpana (2015) Efficient Secured Two Party Computing with Encrypted Data for Public Cloud IJIRCST Vol-3 Issue-2 Page No-31-35] (ISSN 2347 - 5552). www.ijircst.org
Department of Computer Science & Engineering, IFET College of Engineering.