Abstract of Implementation of De, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade | Fazeel Zama [2]


Abstract: In this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption (CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.


Keywords: Data integrity, Data sharing, attribute-based encryption, removing escrow, privacy protection


Edition: Volume 4 Issue 5, May 2015,


Pages: 2627 - 2631


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kamini H. Gonnade, Fazeel Zama, "Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 2627-2631, https://www.ijsr.net/get_abstract.php?paper_id=SUB154865

Similar Articles with Keyword 'Data integrity'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta [65] | Dr. Shiva Prakash

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela | K Rahul Krishna | Dr. Krishna Kumar P R [2] | Triveni N [2]

Share this Article
Top