International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 107

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha


Abstract: Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. A single Key Distribution Centre (KDC) distributes secret keys and attributes to all users. A new decentralized access control scheme for secure data storage in clouds that supportsanonymous authentication is developed. The validity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In thisscheme. Data Owner can share the data and it’s Key to the Permitted users. Data Sharing is achieved for three types of users.1. User Based 2. Role Based (Position / Role), 3. Attribute (Experience). Data is uploaded by the Data Owner based on public key, secret key, Global key and Group key. Public key is randomly generated. Secret key & group key is generated via Attribute. Global key is generated randomly. We encrypt the uploaded file using ABE Algorithm.


Keywords: Access control, Authentication, Key distribution Centre, ABE Algorithm


Edition: Volume 4 Issue 4, April 2015,


Pages: 1899 - 1902


How to Cite this Article?

T. Arokiaarun, D. Saveetha, "Privacy Preservation in Cloud Using Attribute Based Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB153467, Volume 4 Issue 4, April 2015, 1899 - 1902

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Access control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1257 - 1264

Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform

Bhupendra Ram

Share this Article

Similar Articles with Keyword 'ABE Algorithm'

Downloads: 125

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 323 - 325

Secure Sharing of Personal Health Records in Cloud Computing

B. Raj Kumar, S. Satyanarayana

Share this Article

Downloads: 130

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 82 - 86

Modified Public Auditing with Privacy Preservation for Shared Data in Cloud Computing

Jeur Nagaraj Shrikant, Pavan Kumar

Share this Article

Similar Articles with Keyword 'Access'

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Similar Articles with Keyword 'control'

Downloads: 181 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article
Top