A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS

N. Sainath, P. Padmanabham, Swapna Manthani

Abstract


The thought of deniability arises from undeniable fact that coercers cannot show the forecasted evidence is wrong and so haven't any motive to refuse the needed evidence. This process tries to obstruct coercion efforts as coercers observe that their attempts are ineffective. We utilize this idea to make sure that providers of cloud storage can offer audit-free storage services. A lot of the techniques of deniable file encryption consist of the problems of understanding error including techniques of designed understanding. Inside our work we provide a powerful file encryption plan of cloud storage that allows the providers of cloud storage to produce convincing false user strategies for defend user privacy. We employ top features of attribute basis file encryption for obtaining of knowledge that's stored in the method of proper-grained access control additionally to deniable file encryption to postpone outdoors auditing. Our recommended plan will grant clients to get capable of offer fake secrets that appear genuine to exterior coercers.


Keywords


Deniability; Fine-Grained Access Control; Attribute Basis Encryption; Deniable Encryption; Cloud Storage; User Privacy;

References


J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,” in Eurocrypt, 2008, pp. 146–162.

S. Meiklejohn, H. Shacham, and D. M. Freeman, “Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures,” in Asiacrypt, 2010, pp. 519–538.

D. Boneh, R. Canetti, S. Halevi, and J. Katz, “Chosen-ciphertext security from identity-based encryption,” SIAM J. Comput., vol. 36, no. 5, pp. 1301–1328, 2007.

R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, “Deniable encryption,” in Crypto, 1997, pp. 90–104.

A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in Eurocrypt, 2010, pp. 62–91.

N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. de Panafieu, and C. R`afols, “Attribute-based encryption schemes with constant-size ciphertexts,” Theor. Comput. Sci., vol. 422, pp. 15–38, 2012.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.