Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 311

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.2 / 10


     

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph


Abstract: The wireless medium in the military networks are not able to transfer the confidential data between the commander and the soldiers. The commander sends the information to the storage node after encrypting with the help of private keys provided by the key authorities. The soldiers retrieve the information from the storage node by providing their details to the multiple key authorities they provide a private key which helps them to decrypt the information from the storage node. CP-ABE scheme is used for retrieving and securing their data. For data encryption and decryption scalability is provided by ABE. But the problem is that key authorities cannot be fully trusted because they can also access the data from the storage node with the private keys provided by them. In this paper, it is demonstrated how to apply the proposed scheme in Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data.


Keywords: Access control, Attribute based encryption, Multiauthority, Secure Data Retrieval, Networks


Edition: Volume 5 Issue 6, June 2016


Pages: 2165 - 2166


DOI: https://www.doi.org/10.21275/NOV164758



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Princy.B, Nishley Elizabeth Joseph, "Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 2165-2166, https://www.ijsr.net/getabstract.php?paperid=NOV164758, DOI: https://www.doi.org/10.21275/NOV164758

Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut, Seema Singh

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3093 - 3098

Privacy-Conserved Health Care Information System with Efficient Cloud Security

R. Pradeep, T. P. Dayana Peter

Share this Article
Top