In this, for achieving access control to keep the data confidential, the data owner could adopt the Attribute Based Encryption(ABE) to encrypt stored data. In this during delegation the server could tamper or replace the delegated cipher-text and respond a false transformed cipher-text. This cause the server might cheat the authorized user. So, In this we propose a hybrid VD-CPABE (Verifiable Delegation Cipher-text Policy Attribute Based Encryption) Scheme with secure Outsourcing. In this we are using Verifiable delegation model. This model does not support to cheat any authorized user for every data manager maintains a secret key who is having that key that person can gain the data. Otherwise he cannot access the data. Finally it provides security to our data. Keywords : Attribute Based Encryption, Hybrid encryption, Verifiable Delegation Cipher-text policy attribute based encryption.
I.INTRODUCTION Security consists of the policies and practices adopted to prevent and study unauthorized access, depart, mid-course correction, or contend of an individual digital assistant became omitted in and network-accessible resources. It involves the authorization of recover to specific in constrict, which is civilized by the administrator.. Users submit or are isolated an ID and code bought on credit or contradictory authenticating recommendation that allows them gain to intuition and programs within their authority. Security lottery covers a divergence of personal digital assistant networks, both public and unreasonable, that are circumlocutory in everyday jobs; conducting transactions and communications bounded by businesses, government agencies and individuals. Network bribe in the thrift is attentive in intelligence in organizations, enterprises, and special types of institutions. It does as its perform explains: It secures the constrict, as with a inaction as protecting and overseeing operations for done. The most common and absolutely done process of protecting a unite resource is by assigning it a unique favour and an indistinguishable password. Security management is different for all kinds of situations. A home or small office may only require basic security meanwhile large businesses may require high-maintenance and current software and hardware to prevent malicious attacks from hacking and spamming. For data storage, it stores a large amount of shared data, which could be accessed by authorized persons. For delegation computation, the servers could calculate the numerous data. As an application move to the server the cipher-text policy attribute based encryption (CP-ABE) [5], [6] and verifiable delegation [1] used to ensure the data confidentiality. Data confidentiality means if the information is stored on a system that information is protected against unauthorised users and it is often a measure of the ability of system to protect its data. There are two forms in attribute based encryption. First one is key policy attribute based encryption(KP-ABE) [6].In this, the access policy decision is made by k...