Main Article Content

Danisha Shaik
C. Shoba Bindu
P. Dileep Kumar Reddy


The evolution of the cloud computing furnishes a better way for the data storage. ABE with delegation is accustomed for accessing the data and keep it confidential. But this scheme faces some limitations like the cloud servers can replace the cipher text with some malignant intent. They may also cheat the eligible users as unauthorized ones. The cloud servers even face external threats like the security attacks. So, to protect against the security attacks and to preserve the data integrity in the cloud, a hybrid encryption with VD scheme is proposed by Xu et al. Even this scheme faces the challenges like having larger keys, more computational time and vulnerability to man-in-the-middle attacks. A secure Hybrid Encryption using ECC in clouds is proposed to overcome these problems. The application of Elliptic Curve Cryptography and its algorithms in the proposed work provides a greater security because of the Elliptic Curve Discrete Logarithm Problem. The proposed work ensures greater security with the aid of a smaller key size. It also ensures less computational time, less memory and communication bandwidth


Download data is not yet available.

Article Details



Jie Xu, Qiaoyan Wen, Wenmin Li and Zhengping Jin, “ Circuit Cipher-text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing†in Proc. IEEE Transactions on parallel and distributed systems, 2016.

K. Kurosawa and Y. Desmedt,â€A New Paradigm of Hybrid Encryption Scheme,†in Proc. CRYPTO, pp.426-442, Springer-Verlag Berlin, Heidelberg, 2004.

B.Waters, “Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient and Provably Secure Realization,†inProc. PKC, pp.53-70, Springer-Verlag Berlin, Heidelberg, 2011.

Rakel Haakegaard and Joanna Lang , “ The Elliptic Curve Diffie-Hellman (ECDH)â€, December 2015.

Kefa Rabah, “ Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemesâ€, Information Technology Journal 4(2): 132-139, 2005. ISSN 1812-5638.

Andrea Corbellini, “Elliptic Curve Cryptography: ECDH and ECDSAâ€,

,, Accessed on June 20, 2017.

Johannes Bauer, “Elliptic Curve Cryptography Tutorialâ€,, Accessed on June 20, 2107.

William Stallings, “Cryptography and Network Security Principles and Practicesâ€, Prentice Hall Publications, 4th Edition, 2005.

V. Gayoso, Martínez, L. Hernández Encinas, and C. Sánchez Ãvila,†A Survey of the Elliptic Curve Integrated Encryption Schemeâ€, Journal of Computer Science and Engineering,Volume2, Issue 2, August2 2010