Key Policy Attribute Based Encryption in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019

Key Policy Attribute Based Encryption in Cloud Storage

Sonali Deshpande, Dipa Dharmadhikari

The Key Policy Attribute Based Encryption provides how to maintain integrity, confidentiality and availability to share data with others. It generates encryption, decryption time along with file size and file type. Proposed work explains encryption with Attribute Based encryption then file is spitted into chunks. Hash key is generated for every data chunk which is unique. Secure hash algorithm is used for generation of hash key. Proposed algorithm gives confidentiality to work as it is a public key encryption algorithm of cryptography. It is also asymmetric i.e. key set is used for data encryption and decryption. Data is stored on cloud means it is available to everyone through Cloud space. Key generated for encryption and decryption is runtime. Key policy attribute based encryption reduces encryption time by 35 % and decryption time by 65 %.

Keywords: KAC, Key policy attribute based encryption, Integrity, Confidentiality, Availability

Edition: Volume 8 Issue 2, February 2019

Pages: 1717 - 1721

Share this Article

How to Cite this Article?

Sonali Deshpande, Dipa Dharmadhikari, "Key Policy Attribute Based Encryption in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20195611, Volume 8 Issue 2, February 2019, 1717 - 1721

140 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'KAC'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1493 - 1496

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1380 - 1383

Secure Data Forwarding Using KAC

Neethumol S Nair

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1717 - 1721

Key Policy Attribute Based Encryption in Cloud Storage

Sonali Deshpande, Dipa Dharmadhikari

Share this Article

Similar Articles with Keyword 'Integrity'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Similar Articles with Keyword 'Confidentiality'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2457 - 2462

Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation

Rashmi Kadu, Sonali Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Similar Articles with Keyword 'Availability'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 137 - 140

Intelligent Health and Education Trust Recommendation System

Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article
Top