Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 339

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018 | Popularity: 6.4 / 10


     

Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption

Vinod I. Jondhale, Manisha Y. Joshi


Abstract: In cryptography, confidentiality, authenticity and anonymity are studied for long, and to provide security is the reason for all modern cryptographic research. Attribute based view has developed gradually by the requirements of security in a distributed setting. Attribute based encryption have been developed to give a fine grained access control on the data and at present attribute-based systems have wide range of applications in new decentralized settings. When the list of users may not be known prior, attribute based encryption mechanism is useful in these settings. In these settings, all users may possess some credentials or attributes, and these are used to determine access control and also to provide some degree of anonymity with respect to the users identity. Cipher text policy attribute based encryption is a scheme that gives a way to separate the credentials or attributes from the access policy and combine them at a later stage to provide secure access to protected data. We have proposed similar application for secure forensic data report retrieval where the setup algorithm first generates keys using the attributes of the users, the forensic analyst defines a set of attributes to encrypt the report and store the report in temporary storage. The receivers such as policeman, relatives, doctor will have to possess the defined set of attributes to decrypt the report.


Keywords: Cipher text-policy attribute-based encryption CP-ABE, attribute-based encryption ABE, access policy, fine-grained access control


Edition: Volume 7 Issue 4, April 2018


Pages: 980 - 983



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Vinod I. Jondhale, Manisha Y. Joshi, "Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption", International Journal of Science and Research (IJSR), Volume 7 Issue 4, April 2018, pp. 980-983, https://www.ijsr.net/getabstract.php?paperid=ART20181786, DOI: https://www.doi.org/10.21275/ART20181786

Similar Articles

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2025 - 2027

Attribute-Based Access Control Scheme for Security of Cloud Storage Systems Using RNS Cryptography

Priya Thomas

Share this Article

Downloads: 122

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 382 - 385

Mechanism for Secure Fault Tolerant Data Access in Disruption-Tolerant Networks

Subhashini P, Ashwin Kumar M

Share this Article

Downloads: 124

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 775 - 782

Optimizing the Cloud Multimedia Resources using Attribute Based Access through Virtualization

Patil Siddharam, Rekha Patil

Share this Article
Top