Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
The late selection and dissemination of the information imparting ideal model in circulated frameworks, for example, online informal organizations or distributed computing, there have been expanding requests and attentiveness toward appropriated information security. A standout amongst the most difficult issues in information imparting frameworks is the implementation of access approaches and the backing of arrangements overhauls. Ciphertext policy attribute-based encryption (CP-ABE) is turning into a guaranteeing cryptographic answer for this issue. It empowers information holders to characterize their own particular access approaches over client attributes and implement the strategies on the information to be circulated. Notwithstanding, the playing point accompanies a significant downside which is known as an issue escrow problem. The key era focus could decode any messages tended to particular clients by creating their private keys. This is not suitable for information imparting situations where the information holder might want to make their private information just open to assigned clients. What's more, applying CP-ABE in the information offering framework acquaints an alternate test concerning the client repudiation since the right to gain entrance strategies are characterized just over the attribute universe. Consequently, in this study, a novel CP-ABE plan for an information offering framework by misusing the normal for the framework structural engineering. The plan offers the accompanying accomplishments 1) the key escrow problem could be understood by without escrow key issuing convention, which is built utilizing the safe two-gathering reckoning between the key era focus and the information putting away focus, and 2) fine-grained client disavowal for every each one attribute might be possible as a substitute encryption which exploits the particular attribute gathering key dissemination on top of the ABE. The execution and security examinations show that the proposed plan is effective to safely deal with the information appropriated in the information imparting framework.
Keywords: Data sharing, revocation, access control, removing escrow, Ciphertext, encryption
Edition: Volume 4 Issue 6, June 2015
Pages: 1687 - 1689
How to Cite this Article?
Ashwini Ahire, Prashant Jawalkar, "Enhancing Security and Effectiveness in Characteristic Based Information Offering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155425, Volume 4 Issue 6, June 2015, 1687 - 1689
137 PDF Views | 105 PDF Downloads
Similar Articles with Keyword 'Data sharing'
Views: 134 , Downloads: 99 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Views: 142 , Downloads: 99 | CTR: 70 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Views: 126 , Downloads: 101 | CTR: 80 %
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Views: 134 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2467 - 2469Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud
Shazadi Fatima Rizvi, A. N. Jaiswal
Similar Articles with Keyword 'revocation'
Views: 126 , Downloads: 101 | CTR: 80 %
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Views: 138 , Downloads: 103 | CTR: 75 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Views: 173 , Downloads: 103 | CTR: 60 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1499 - 1502Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Ajmy Abbas
Views: 153 , Downloads: 105 | CTR: 69 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
Views: 128 , Downloads: 105 | CTR: 82 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2124 - 2127A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
Mahesh Shinde, Y.B.Gurav
Similar Articles with Keyword 'access control'
Views: 79 , Downloads: 63 | CTR: 80 % | Weekly Popularity: ⮙8
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga
Views: 125 , Downloads: 99 | CTR: 79 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Views: 127 , Downloads: 101 | CTR: 80 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1454 - 1457A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data
Waghmare Ashwini R, V. M. Jarali
Views: 123 , Downloads: 102 | CTR: 83 %
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1373 - 1376Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra, K. Raghavendra Rao
Views: 116 , Downloads: 102 | CTR: 88 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2839 - 2841Novel Scheme to Segment Privacy and Securing Information to Brokering in Distributed Sharing
Sagar S. Sanghavi, Rajesh A. Auti
Similar Articles with Keyword 'removing escrow'
Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Views: 125 , Downloads: 113 | CTR: 90 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2627 - 2631Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama
Views: 167 , Downloads: 140 | CTR: 84 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 119 - 122Improving Security and Efficiency in Attribute-Based Data Sharing
M. Pratheepa, R. Bharathi
Similar Articles with Keyword 'Ciphertext'
Views: 134 , Downloads: 99 | CTR: 74 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Views: 141 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2369 - 2374Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage
Ghilby Varghese Jaison
Views: 129 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1493 - 1496Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing
Sakkubai M Horatti, Gopal B
Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Views: 140 , Downloads: 107 | CTR: 76 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1122 - 1125Improving Security of Traceable White-Box CPABE with TTP Access Control
Dilu Anil
Similar Articles with Keyword 'encryption'
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Views: 165 , Downloads: 91 | CTR: 55 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote