Public Auditing for Shared Data with Efficient user Revocation on ABE |
Author(s): |
P. Tamil , GOBI ARTS AND SCIENCE COLLEGE; T.P. Senthil Kumar, GOBI ARTS AND SCIENCE COLLEGE |
Keywords: |
Data sharing, Attribute based encryption, Cipher text policy, Key generation, Public auditing, Revocation |
Abstract |
Attribute based encryption (ABE) theme, attributes are centered for vital role. Attribute based encryption has been pictured as a promising cryptologic primitive for realizing secure and versatile access management. Attributes area unit to be segregate to get a public key for encrypting knowledge associate degreed are used as an access policy to regulate user access. With the recent adoption and diffusion of the info sharing paradigm in distributed systems like on-line social networks or cloud computing, there are increasing demands and issues for distributed knowledge security. The performance and security analyses indicate that the projected theme is economical to firmly manage information the data distributed within the data sharing system. One of the foremost difficult problems in information sharing systems is that the social control of access policies and also the support of policies updates. Ciphertext Policy Attribute Based Encryption (CP-ABE) is turning into a promising cryptanalytic resolution to the present issue. It permits knowledge homeowners to outline their own access policies over user attributes and enforce the policies on the info to be distributed. The performance and security analyses indicate that the projected theme is economical to firmly manage the data distributed within the data sharing system. |
Other Details |
Paper ID: IJSRDV3I60510 Published in: Volume : 3, Issue : 6 Publication Date: 01/09/2015 Page(s): 976-980 |
Article Preview |
|
|