International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 123

Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019


Key Policy Attribute Based Encryption in Cloud Storage

Sonali Deshpande, Dipa Dharmadhikari


Abstract: The Key Policy Attribute Based Encryption provides how to maintain integrity, confidentiality and availability to share data with others. It generates encryption, decryption time along with file size and file type. Proposed work explains encryption with Attribute Based encryption then file is spitted into chunks. Hash key is generated for every data chunk which is unique. Secure hash algorithm is used for generation of hash key. Proposed algorithm gives confidentiality to work as it is a public key encryption algorithm of cryptography. It is also asymmetric i. e. key set is used for data encryption and decryption. Data is stored on cloud means it is available to everyone through Cloud space. Key generated for encryption and decryption is runtime. Key policy attribute based encryption reduces encryption time by 35 % and decryption time by 65 %.


Keywords: KAC, Key policy attribute based encryption, Integrity, Confidentiality, Availability


Edition: Volume 8 Issue 2, February 2019,


Pages: 1717 - 1721


How to Cite this Article?

Sonali Deshpande, Dipa Dharmadhikari, "Key Policy Attribute Based Encryption in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20195611, Volume 8 Issue 2, February 2019, 1717 - 1721

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'KAC'

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1493 - 1496

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Similar Articles with Keyword 'Integrity'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 84

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Similar Articles with Keyword 'Confidentiality'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'Availability'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 915 - 920

Calibration Software: Performance Analysis

Prasad Rajendra Kumbhar, Anil R. Surve, Shailender Shekhawat

Share this Article
Top