COMMUNICATIVE AND PROFICIENT DATA ENTRÉE MANAGE FOR MULTI RIGHTS CLOUD

A.Divya Bharathi, Syed. Mazharuddin

Abstract


Cipher text-Policy ABE (Clubpenguin-ABE) is resourcefully designed meant for access control concerning encrypted data. It's one among the primary appropriate technologies meant for controlling of understanding access within cloud storage systems, because it offers the data owner additional direct control above access policies. The revocable multi-authority CPABE can be a capable technique, which may be functional in almost any distant storage systems furthermore to online social systems. We submit a revocable plan of multiauthority Clubpenguin-ABE structure that may support capable attribute revocation. Our plan doesn't necessitate server to obtain completely reliable, since key update is enforced by every attribute authority not server. Even though the server isn't semi-reliable in a number of scenarios, our schemes could assurance backward security and additionally forecasted structure is well-organized and incurs less computation outlay, that's safe and accomplishes backward security furthermore to forward security. Within our novel attribute revocation method, only ciphertexts which are associated with revoked attribute must be modernized.


Keywords


Multi-Authority CPABE; Revocation; Semi-Trusted; Attribute Authority; Encryption;

References


B. Waters, ‘‘Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,’’ in Proc. 4th Int’l Conf. Practice and Theory in Public Key Cryptography (PKC’11), 2011, pp. 53-70.

V. Goyal, A. Jain,O. Pandey, andA. Sahai, ‘‘Bounded Ciphertext Policy Attribute Based Encryption,’’ in Proc. 35th Int’l Colloquium on Automata, Languages, and Programming (ICALP’08), 2008, pp. 579-591.

M. Chase and S.S.M. Chow, ‘‘Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,’’ in Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), 2009, pp. 121-130.

A.B. Lewko and B. Waters, ‘‘Decentralizing Attribute -Based Encryption,’’ in Proc. Advances in Cryptology-EUROCRYPT’11, 2011, pp. 568-588.

J. Hur and D.K. Noh, ‘‘Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,’’ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.

S. Jahid, P. Mittal, and N. Borisov, ‘‘Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,’’ in Proc. 6th ACM Symp. Information, Computer and Comm. Security ASIACCS’11), 2011, pp. 411-415.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.