International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing

Kamini H. Gonnade | Fazeel Zama [2]


Abstract: In this paper, our main issue is an authorization and providing the data security for various applications in web services in a network. Cloud Computing is a revolutionary IT field and we are using this technology for various purposes. With the increasing use of the data sharing in distributed systems such as online social networks or cloud computing, there is increasing in concerns for data security while distributing or sharing data. Here, Ciphertext policy attribute-based Encryption (CP-ABE) is becoming cryptographic solution to above issue of secured data sharing among network. Also, we will have these achievements1) key escrow problem could be solved by escrow-free key issuing protocol, where key is generated using the secure two-party computation between the key generation center and the data-storing center 2) fine-grained user revocation per each attribute could be done by using anonymous id algorithm where sharing of data will be done on attribute basis.


Keywords: Data integrity, Data sharing, attribute-based encryption, removing escrow, privacy protection


Edition: Volume 4 Issue 5, May 2015,


Pages: 2627 - 2631


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kamini H. Gonnade, Fazeel Zama, "Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 2627-2631, https://www.ijsr.net/get_abstract.php?paper_id=SUB154865

Similar Articles with Keyword 'Data integrity'

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj | Nalina V | Rithvik Mohan V

Share this Article

Downloads: 85

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha [5] | Ankur Singh [4]

Share this Article
Top