CAPABLE AND SECURE DATA ACCESS TO THE INTERNET SUPPORTED OBJECTS IN THE SMART SYSTEM

Nandala Narayanamma, D Mohammed Rafi

Abstract


Under the current plan, when the user exits the user group, the manager of the audience only cancels the group's secret key, which means that the private user key associated with the attribute remains valid. Our plan is suitable for devices with limited resources. If someone within the group intentionally discovers the public's confidential response to the revoked user, they can perform the understandings through their own key. To demonstrate this attack, a specific instance is presented. We have demonstrated our safety in our plan under the assumption of Daffier-Hellman (DCDH) for the divisible account. Unfortunately, the ABE plan requires high arithmetic expenses while performing encryption and understanding of files. This defect becomes more severe for lightweight devices due to restricted computing sources. Within this system, we focused on designing the Club-ping-ABE plan with efficient user revocation of the cloud storage system. The result of our experience shows that the cost of computing for local devices is relatively low and can be fixed. We tried to design the attack model for collusion by users who were removed and who were collaborating with existing users. In addition, we built the penguin-ABE Club plan to cancel the eligible user by increasing the current plan and proving that our plan is safe for cost-per-acquisition under the selective model.


References


M. Green, S. Hohenberger and B. Waters, “Outsourcing the decryption of ABE ciphertexts,”Proc.20th USENIX Conference on Security (SEC ’11), pp. 34, 2011.

Z. Liu, Z. Cao, Q. Huang, D. S. Wong and T. H. Yuen, “Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption with-out Random Oracles,”Proc.16th European Symposium on Research in Computer Security(ESORICS ’11), LNCS6879, Berlin:Springer-Verlag, pp. 278-297, 2011.

M. Blaze, G. Bleumerand M. Strauss, “Divertible Protocols and Atom-ic Proxy Cryptography,”Proc.International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT ’98), LNCS1403, and Berlin: Springer-Verlag, pp. 127-144, 1998.

J.W. Li, C.F. Jia, J. Liand X.F. Chen, “Outsourcing Encryption of At-tribute-Based Encryption with Mapreduce,”Proc.14th International ConferenceonInformation and Communications Security (ICICS ’12), LNCS7618, Berlin: Springer-Verlag, pp. 191-201, 2012.

Jingo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han, Member, IEEE, “Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing”, IEEE Transactions on Services Computing, 2016.

M. Yang, F. Liu, J. Han, and Z. Wang, “An Efficient Attribute based Encryption Scheme with Revocation for Outsourced Data Sharing Control,” Proc.2011International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 516-520, 2011.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based En-cryption for Fine-Grained Access Control of Encrypted Data,”Proc.13th ACM Conference on Computer and Communications Security (CCS ’06), pp. 89-98, 2006, doi:10.1145/1180405.1180418.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.