B. Madhava Sai Reddy, Y. Praveen Kumar


Within the prevailing aim, every time an enjoyer leaves on the purchaser class, the target market boss simplest revokes his club underground key that means the purchaser’s inner most key related attributes remains weighty. Our project is acceptable for refuge blocked devices. If an individual in the categorize deliberately exposes the target market confidential information obey the revoked shopper, he's able to carry out figuring out operations past his inner most key. To provide an explanation for this person blast, a congealed mention is accessible. We end up the security in our plot covered the divided ciphering Diffie-Hellman (DCDH) acceptance. Regrettably, ABE design calls for expensive data processing expense during carry outing rasp encryption and working out operations. This apostatize distract be massed harsh for incompetent devices as a result of their secured computing sources. Within the thing indicated practice, we consider cunning a Club penguin-ABE arrange beside useful customer cancellation for muddy argosy artifice. Caused by our examination shows guess expense for local devices is relatively low and will be attached. We attempt to design plot blast browned by revoked purchasers cooperating alongside current shoppers. In extension, we formulate an efficient shopper voiding Club penguin-ABE idea by means of accentuating the present work out and end up our design is CPA reliable nether the selective variety.


Outsourced Encryption; Cloud Computing; Collusion Attack; Attribute-Based Encryption; User Revocation


M. Green, S. Hochenberger and B. Waters, “Outsourcing the decryption of ABE ciphertexts,”Proc.20th USENIX Conference on Security (SEC ’11), pp. 34, 2011.

M. Yang, F. Liu, J. Han, and Z. Wang, “An Efficient Attribute based Encryption Scheme with Revocation for Outsourced Data Sharing Control,” Proc.2011International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 516-520, 2011.

Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han, Member, IEEE, “Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing”, IEEE Transactions on Services Computing, 2016.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based En-cryption for Fine-Grained Access Control of Encrypted Data,”Proc.13th ACM Conference on Computer and Communications Security (CCS ’06), pp. 89-98, 2006, doi:10.1145/1180405.1180418.

M. Blaze, G. Bleumerand M. Strauss, “Divertible Protocols and Atom-ic Proxy Cryptography,”Proc.International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT ’98), LNCS1403, and Berlin: Springer-Verlag, pp. 127-144, 1998.

Z. Liu, Z. Cao, Q. Huang, D. S. Wong and T. H. Yuen, “Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption with-out Random Oracles,”Proc.16th European Symposium on Research in Computer Security(ESORICS ’11), LNCS6879, Berlin:Springer-Verlag, pp. 278-297, 2011.

J.W. Li, C.F. Jia, J. Liand X.F. Chen, “Outsourcing Encryption of At-tribute-Based Encryption with Mapreduce,”Proc.14th International ConferenceonInformation and Communications Security (ICICS ’12), LNCS7618, Berlin: Springer-Verlag, pp. 191-201, 2012.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.