Enhancing Security and Effectiveness in Characteristic Based Information Offering
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

The late selection and dissemination of the information imparting ideal model in circulated frameworks, for example, online informal organizations or distributed computing, there have been expanding requests and attentiveness toward appropriated information security. A standout amongst the most difficult issues in information imparting frameworks is the implementation of access approaches and the backing of arrangements overhauls. Ciphertext policy attribute-based encryption (CP-ABE) is turning into a guaranteeing cryptographic answer for this issue. It empowers information holders to characterize their own particular access approaches over client attributes and implement the strategies on the information to be circulated. Notwithstanding, the playing point accompanies a significant downside which is known as an issue escrow problem. The key era focus could decode any messages tended to particular clients by creating their private keys. This is not suitable for information imparting situations where the information holder might want to make their private information just open to assigned clients. What's more, applying CP-ABE in the information offering framework acquaints an alternate test concerning the client repudiation since the right to gain entrance strategies are characterized just over the attribute universe. Consequently, in this study, a novel CP-ABE plan for an information offering framework by misusing the normal for the framework structural engineering. The plan offers the accompanying accomplishments 1) the key escrow problem could be understood by without escrow key issuing convention, which is built utilizing the safe two-gathering reckoning between the key era focus and the information putting away focus, and 2) fine-grained client disavowal for every each one attribute might be possible as a substitute encryption which exploits the particular attribute gathering key dissemination on top of the ABE. The execution and security examinations show that the proposed plan is effective to safely deal with the information appropriated in the information imparting framework.

Keywords: Data sharing, revocation, access control, removing escrow, Ciphertext, encryption

Edition: Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Share this Article

How to Cite this Article?

Ashwini Ahire, Prashant Jawalkar, "Enhancing Security and Effectiveness in Characteristic Based Information Offering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155425, Volume 4 Issue 6, June 2015, 1687 - 1689

137 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data sharing'

Views: 134 , Downloads: 99 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Views: 142 , Downloads: 99 | CTR: 70 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Views: 126 , Downloads: 101 | CTR: 80 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 134 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'revocation'

Views: 126 , Downloads: 101 | CTR: 80 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 138 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Views: 173 , Downloads: 103 | CTR: 60 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1499 - 1502

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Ajmy Abbas

Share this Article

Views: 153 , Downloads: 105 | CTR: 69 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Views: 128 , Downloads: 105 | CTR: 82 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2124 - 2127

A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation

Mahesh Shinde, Y.B.Gurav

Share this Article

Similar Articles with Keyword 'access control'

Views: 79 , Downloads: 63 | CTR: 80 % | Weekly Popularity: ⮙8

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Views: 125 , Downloads: 99 | CTR: 79 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Views: 127 , Downloads: 101 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Views: 123 , Downloads: 102 | CTR: 83 %

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2839 - 2841

Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing

Sagar S. Sanghavi, Rajesh A. Auti

Share this Article

Similar Articles with Keyword 'removing escrow'

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Views: 125 , Downloads: 113 | CTR: 90 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

Views: 167 , Downloads: 140 | CTR: 84 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 119 - 122

Improving Security and Efficiency in Attribute-Based Data Sharing

M. Pratheepa, R. Bharathi

Share this Article

Similar Articles with Keyword 'Ciphertext'

Views: 134 , Downloads: 99 | CTR: 74 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Views: 141 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Views: 129 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1493 - 1496

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Views: 140 , Downloads: 107 | CTR: 76 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Similar Articles with Keyword 'encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article
Top