Published September 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

An Approach for Enhancing Privacy and Protection in Decentralized Multi-Authority Characteristic-based on Encryption in Cloud Computing

  • 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.
  • 2. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.

Contributors

Contact person:

  • 1. Department of Computer Science and Engineering, CMR Engineering College, Hyderabad (Telangana), India.

Description

Abstract: The Decentralizing multi-authority Attribute- Based secret writing has applied for finding issues arising from sharing various confidential company information in resources like cloud computing. The dispersivemulti-authority trait- Grounded secret jotting systems that wont accept the central authority, conspiracy resistance may be achieved employing a transnational symbol. thus, identity must be managed encyclopedically, which ends in pivotal issues of sequestration and security. A theme is developed which do not use the central authority to manage druggies and keys and solely easy trust relations ought to get shaped by participating the general public key between every Authority. stoner individualities square measure distinctive by combining a stoner’s identity with the Attribute Authority wherever the stoner is set up. Once a crucial request must be created to an authority outside the sphere, the request must be performed by the authority within the current sphere rather of by the druggies, so, stoner individualities stay nonpublic to the Attribute Authority outside the sphere, which can enhance sequestration and security and also the crucial supplying. The theme relies on order direct brigades. an suggestion of security is bestowed that uses the binary System secret jotting methodology. Once the trait authorities in each sphere are members of a hierarchicalmulti-authority ABE, the goal for future work must be to develop a system that combines the plan presented in this study with the hierarchicalmulti-authority ABE.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

C72780911322.pdf

Files (658.1 kB)

Name Size Download all
md5:9488c963a904b059205dcd2e7ec3f35b
658.1 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

References

  • J. Horwitz,B. Lynn, "Towards hierarchical identity-based encryption,"in Proc. EUROCRYPT, Amsterdam, The Netherlands, April.2002, pp.466-481.
  • C. Gentry, A. Silverberg, "Hierarchical ID-based cryptography," in Proc. ASIACRYPT, Singapore, December. 2002, pp. 548-566.
  • D. Boneh, X. Boyen, "Efficient Selective-ID secure identity based encryption without random oracles,"in Proc .EUROCRYPT, Interlaken, Switzerland, May.2004,pp. 223-238.
  • D. Boneh, X. Boyen, E. Goh, "Hierarchical identity based encryption with constant size ciphertext,"in Proc. EUROCRYPT, Aarhus, Denmark, May.2005, pp. 440-456.
  • X. Boyen, B. Waters, "Anonymous hierarchical identity-based encryption(without random oracles),"inProc.CRYPTO, Santa Barbara, California, USA, August.2006, pp. 290-307.
  • G. Wang, Q. Liu, J. Wu,M. Guo, "Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,"Computers&security, 30 (5), pp. 320-331, July.2011.
  • M. Chase, "Multi-authority attribute based encryption,"inProc.TCC, Amsterdam, The Netherlands, February.2007, pp. 515-534.
  • M. Chase, S. Chow, "Improving privacy and security in multi-authority attribute-based encryption,"inProc.CCS, Chicago, Illinois, USA, November.2009, pp. 121-130.
  • Y.Rahulamathavan, S.Veluru, J.Han, F.Li, M.Rajarajan and R.Lu, "User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,"IEEE Transactions on Computers, 65(9), pp. 2939-2946,September. 2016.
  • A. BEIMEL, "SECRET-SHARINGSCHEMES: A SURVEY.IN: CODING AND CRYPTOLOGY-THIRD INTERNATIONAL WORKSHOP

Subjects

ISSN: 2277-3878 (Online)
https://portal.issn.org/resource/ISSN/2277-3878
Retrieval Number: 100.1/ijrte.C72780911322
https://www.ijrte.org/portfolio-item/C72780911322/
Journal Website: www.ijrte.org
https://www.ijrte.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/