International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 106

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015


Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar


Abstract: The late selection and dissemination of the information imparting ideal model in circulated frameworks, for example, online informal organizations or distributed computing, there have been expanding requests and attentiveness toward appropriated information security. A standout amongst the most difficult issues in information imparting frameworks is the implementation of access approaches and the backing of arrangements overhauls. Ciphertext policy attribute-based encryption (CP-ABE) is turning into a guaranteeing cryptographic answer for this issue. It empowers information holders to characterize their own particular access approaches over client attributes and implement the strategies on the information to be circulated. Notwithstanding, the playing point accompanies a significant downside which is known as an issue escrow problem. The key era focus could decode any messages tended to particular clients by creating their private keys. This is not suitable for information imparting situations where the information holder might want to make their private information just open to assigned clients. What's more, applying CP-ABE in the information offering framework acquaints an alternate test concerning the client repudiation since the right to gain entrance strategies are characterized just over the attribute universe. Consequently, in this study, a novel CP-ABE plan for an information offering framework by misusing the normal for the framework structural engineering. The plan offers the accompanying accomplishments 1) the key escrow problem could be understood by without escrow key issuing convention, which is built utilizing the safe two-gathering reckoning between the key era focus and the information putting away focus, and 2) fine-grained client disavowal for every each one attribute might be possible as a substitute encryption which exploits the particular attribute gathering key dissemination on top of the ABE. The execution and security examinations show that the proposed plan is effective to safely deal with the information appropriated in the information imparting framework.


Keywords: Data sharing, revocation, access control, removing escrow, Ciphertext, encryption


Edition: Volume 4 Issue 6, June 2015,


Pages: 1687 - 1689


How to Cite this Article?

Ashwini Ahire, Prashant Jawalkar, "Enhancing Security and Effectiveness in Characteristic Based Information Offering", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB155425, Volume 4 Issue 6, June 2015, 1687 - 1689

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Data sharing'

Downloads: 101

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Similar Articles with Keyword 'revocation'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Similar Articles with Keyword 'access control'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'removing escrow'

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2627 - 2631

Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade, Fazeel Zama

Share this Article

Downloads: 144

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 119 - 122

Improving Security and Efficiency in Attribute-Based Data Sharing

M. Pratheepa, R. Bharathi

Share this Article

Similar Articles with Keyword 'Ciphertext'

Downloads: 101

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 522 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'sharing'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article
Top