Improving Security and Efficiency in Attribute-Based Data Sharing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 1, January 2014

Improving Security and Efficiency in Attribute-Based Data Sharing

M. Pratheepa, R. Bharathi

The key generation center could decrypt any messages addressed to specific users by generating their private keys. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users key. so overcome this problem we propose escrow problem which means a written agreement delivered to a third party and Attribute-based encryption (ABE) is a promising Cryptographic approach fine-grained data access control which is provides a way of defining access policies based on different attributes of the requester, environment, or the data object. The KGC can decrypt every cipher text addressed to specific users by generating their attribute keys. This could be a potential threat to the data confidentiality or privacy in the data sharing systems.

Keywords: Data sharing, attribute-based encryption, revocation, access control, removing escrow

Edition: Volume 3 Issue 1, January 2014

Pages: 119 - 122

Share this Article

How to Cite this Article?

M. Pratheepa, R. Bharathi, "Improving Security and Efficiency in Attribute-Based Data Sharing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013739, Volume 3 Issue 1, January 2014, 119 - 122

162 PDF Views | 138 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data sharing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1358 - 1361

A Survey on Privacy Preservation and sharing Data Securely in Cloud Storage

Manoj. S. Tore, S. K. Sonkar

Share this Article

Similar Articles with Keyword 'attribute-based encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1553 - 1555

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentication

Manju Lakshmi, Anju Rachel Oommen, Smita C Thomas

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Similar Articles with Keyword 'revocation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Similar Articles with Keyword 'access control'

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Similar Articles with Keyword 'removing escrow'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 119 - 122

Improving Security and Efficiency in Attribute-Based Data Sharing

M. Pratheepa, R. Bharathi

Share this Article
Top