An Approach for Enhancing Privacy and Protection in Decentralized Multi-Authority Characteristic-based on Encryption in Cloud Computing
- 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
- 2. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
Contributors
Contact person:
- 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
Description
Abstract: The Decentralizing multi-authority Attribute- Based secret writing has applied for finding issues arising from sharing various confidential company information in resources like cloud computing. The dispersivemulti-authority trait- Grounded secret jotting systems that wont accept the central authority, conspiracy resistance may be achieved employing a transnational symbol. thus, identity must be managed encyclopedically, which ends in pivotal issues of sequestration and security. A theme is developed which do not use the central authority to manage druggies and keys and solely easy trust relations ought to get shaped by participating the general public key between every Authority. stoner individualities square measure distinctive by combining a stoner’s identity with the Attribute Authority wherever the stoner is set up. Once a crucial request must be created to an authority outside the sphere, the request must be performed by the authority within the current sphere rather of by the druggies, so, stoner individualities stay nonpublic to the Attribute Authority outside the sphere, which can enhance sequestration and security and also the crucial supplying. The theme relies on order direct brigades. an suggestion of security is bestowed that uses the binary System secret jotting methodology. Once the trait authorities in each sphere are members of a hierarchicalmulti-authority ABE, the goal for future work must be to develop a system that combines the plan presented in this study with the hierarchicalmulti-authority ABE.
Notes
Files
C72780911322.pdf
Files
(658.1 kB)
Name | Size | Download all |
---|---|---|
md5:9488c963a904b059205dcd2e7ec3f35b
|
658.1 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2277-3878 (ISSN)
References
- J. Horwitz,B. Lynn, "Towards hierarchical identity-based encryption,"in Proc. EUROCRYPT, Amsterdam, The Netherlands, April.2002, pp.466-481.
- C. Gentry, A. Silverberg, "Hierarchical ID-based cryptography," in Proc. ASIACRYPT, Singapore, December. 2002, pp. 548-566.
- D. Boneh, X. Boyen, "Efficient Selective-ID secure identity based encryption without random oracles,"in Proc .EUROCRYPT, Interlaken, Switzerland, May.2004,pp. 223-238.
- D. Boneh, X. Boyen, E. Goh, "Hierarchical identity based encryption with constant size ciphertext,"in Proc. EUROCRYPT, Aarhus, Denmark, May.2005, pp. 440-456.
- X. Boyen, B. Waters, "Anonymous hierarchical identity-based encryption(without random oracles),"inProc.CRYPTO, Santa Barbara, California, USA, August.2006, pp. 290-307.
- G. Wang, Q. Liu, J. Wu,M. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,"Computers&security, 30 (5), pp. 320-331, July.2011.
- M. Chase, "Multi-authority attribute based encryption,"inProc.TCC, Amsterdam, The Netherlands, February.2007, pp. 515-534.
- M. Chase, S. Chow, "Improving privacy and security in multi-authority attribute-based encryption,"inProc.CCS, Chicago, Illinois, USA, November.2009, pp. 121-130.
- Y.Rahulamathavan, S.Veluru, J.Han, F.Li, M.Rajarajan and R.Lu, "User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,"IEEE Transactions on Computers, 65(9), pp. 2939-2946,September. 2016.
- A. BEIMEL, "SECRET-SHARINGSCHEMES: A SURVEY.IN: CODING AND CRYPTOLOGY-THIRD INTERNATIONAL WORKSHOP
Subjects
- ISSN: 2277-3878 (Online)
- https://portal.issn.org/resource/ISSN/2277-3878
- Retrieval Number: 100.1/ijrte.C72780911322
- https://www.ijrte.org/portfolio-item/C72780911322/
- Journal Website: www.ijrte.org
- https://www.ijrte.org/
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org/