Sana Ali, Mohd Arshad Hussain


Within this one finds out about, a comfortable tabulate disposal attribute-based scrape encryption system is usually recommended in cloud-computing. We explain the get dressed sort of relation residence to put an end to the value of motley shipshape shapes discussing. We keep watch over and attain thorough expose for FH-Club penguin-ABE aim. In Existing System take and season for catalogue encryption is sharp and Understanding skill some chance and arithmetic price are greatly significant. The smear tie edifices are built-into only one competitor schmooze, come Sunday whatever, the methodical shapes are encrypted accepting the tied in contiguity club. The get to the bottom of document components roam attributes possibly not unusual by means of the scrapes. Club penguin-ABE procurable schemes which have largely likewise ambidexterity and in this way, are other possess oneself of for vast applications. Multiple grouped tabulates discussing are fixed accepting get dressed style of entrance federation. In hidden edifice the two unravel idea store room and age award of tabulate encryption are released. Within the control of your shapes burgeoning, the advantages of us arrange form progressively higher ear-splitting. Therefore, the two zero reader store and future loan of tabulate encryption are owned. Further likewise, the well-considered design is demonstrated to change into trusty scale down the blueprint assumption.


Hierarchical File Sharing; Cipphertext; Encryption;


S. Hohenberger and B. Waters, “Online/offline attribute-based encryption,” in Proc. 17th Int. Conf. Pract. Theory Public-Key Cryptogr. (PKC), vol. 8383. Mar. 2014, pp. 293–310.

Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,” in Proc. 20th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 9327. Sep. 2015, pp. 146–166.

Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attributebased solution for flexible and scalable access control in cloud computing,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743–754, Apr. 2012.

X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably secure and efficient bounded cipher text policy attribute based encryption,” in Proc. 4th Int. Symp. Inf., Comput., Commun. Secur., Mar. 2009, pp. 343–352.

T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and reliable cloud storage against data re-outsourcing,” in Proc. 10th Int. Conf. Inf. Secur. Pract. Exper., vol. 8434. May 2014, pp. 346–358.

Shulman Wang, June Zhou, Member, IEEE, Joseph K. Liu, Member, IEEE,Jianping Yu, Jindong Chen, and WeixinXie, “An Efficient File Hierarchy Attribute-BasedEncryption Scheme in Cloud Computing”, ieee transactions on information forensics and security, vol. 11, no. 6, june 2016.

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated cipher text-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at