Privacy Preservation in Cloud Using Attribute Based Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. A single Key Distribution Centre (KDC) distributes secret keys and attributes to all users. A new decentralized access control scheme for secure data storage in clouds that supportsanonymous authentication is developed. The validity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In thisscheme. Data Owner can share the data and its Key to the Permitted users. Data Sharing is achieved for three types of users. 1. User Based 2. Role Based (Position / Role), 3. Attribute (Experience). Data is uploaded by the Data Owner based on public key, secret key, Global key and Group key. Public key is randomly generated. Secret key & group key is generated via Attribute. Global key is generated randomly.We encrypt the uploaded file using ABE Algorithm.

Keywords: Access control, Authentication, Key distribution Centre, ABE Algorithm

Edition: Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Share this Article

How to Cite this Article?

T. Arokiaarun, D. Saveetha, "Privacy Preservation in Cloud Using Attribute Based Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153467, Volume 4 Issue 4, April 2015, 1899 - 1902

Enter Your Registered Email Address



Email Address Not Registered?




Similar Articles with Keyword 'Access control'

Downloads: 66 | Weekly Hits: ⮙2 | Monthly Hits: ⮙35

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 102 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1553 - 1555

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentication

Manju Lakshmi, Anju Rachel Oommen, Smita C Thomas

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'ABE Algorithm'

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Downloads: 125 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 323 - 325

Secure Sharing of Personal Health Records in Cloud Computing

B. Raj Kumar, S. Satyanarayana

Share this Article

Downloads: 130 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 82 - 86

Modified Public Auditing with Privacy Preservation for Shared Data in Cloud Computing

Jeur Nagaraj Shrikant, Pavan Kumar

Share this Article



Top